PtzDriverInfo
PtzMakeCommand
PtzProperty
Static task
static1
Behavioral task
behavioral1
Sample
ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929.dll
Resource
win10v2004-20221111-en
Target
ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929
Size
48KB
MD5
47c2d556b337878521028afd2cbe7634
SHA1
55a81df4849f7bf2837c4e017f7b1a74b6e817b7
SHA256
ca457bcdfc6fb6dd038b72ea2307b1d8147c0f4a83f90dc38b38da471cd50929
SHA512
70ffa8d5a7d54a7081b101ed3cb8b866722f6794eb16bced66a2f78c657eb6b6ac52047fada08e42cbc83e62107fee31ceea1ea779cdf894500ae2cdeabd3d69
SSDEEP
768:bJpJAThLRCzY/ITt8DAiHbMhtnDKloXh3KKDEL:/JAThLss/Oj/2oRvDEL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeEnvironmentStringsW
WritePrivateProfileStructA
GetModuleFileNameA
GetEnvironmentStrings
WideCharToMultiByte
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
HeapAlloc
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetPrivateProfileStructA
GetCPInfo
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
VirtualAlloc
HeapReAlloc
RtlUnwind
LCMapStringW
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
IsDlgButtonChecked
CheckDlgButton
GetDlgItem
SendDlgItemMessageA
SetDlgItemTextA
EndDialog
DialogBoxParamA
wsprintfA
PtzDriverInfo
PtzMakeCommand
PtzProperty
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ