DelItemString
Mem_Malloc
Module_GetFilename
vSetTargetWPath
Static task
static1
Behavioral task
behavioral1
Sample
8e4ef73ea988a0e38a00ba362edbe49aa4a569777d4f03f91bd7219788f182b4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e4ef73ea988a0e38a00ba362edbe49aa4a569777d4f03f91bd7219788f182b4.dll
Resource
win10v2004-20221111-en
Target
8e4ef73ea988a0e38a00ba362edbe49aa4a569777d4f03f91bd7219788f182b4
Size
543KB
MD5
22862f341d33cebad708bc985fcb2c79
SHA1
9165622b60f843736860158dd9c839e620ca71ab
SHA256
8e4ef73ea988a0e38a00ba362edbe49aa4a569777d4f03f91bd7219788f182b4
SHA512
d5d2b3c6be9ac377e764ec8a9b492143210df99997e4dddfe6e3ac990b1ee12cb24e8239f044b3f917767d844414168c0cfacbce7d59755a15177f43a46257b7
SSDEEP
12288:29QsgvgtXGXcXisuJCnB2PqutgR7Ha27MkFXky1l:26YQIfblxH5PFX71
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetWindowPos
SetWindowRgn
ShowWindow
UnionRect
UnregisterClassA
EndPaint
DestroyWindow
DefWindowProcA
CreateWindowExA
BeginPaint
CharNextA
CallWindowProcA
SetWindowLongA
SetFocus
ReleaseDC
RegisterClassExA
PtInRect
OffsetRect
LoadCursorA
IsWindow
IsChild
InvalidateRect
IntersectRect
GetWindowLongA
GetParent
GetKeyState
GetFocus
GetDC
GetClientRect
GetClassInfoExA
EqualRect
CoTaskMemAlloc
CoTaskMemFree
CreateOleAdviseHolder
OleSaveToStream
WriteClassStm
CoCreateInstance
lstrlenW
lstrlenA
lstrcmpiA
WriteFile
WideCharToMultiByte
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FlushInstructionCache
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadResource
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
RtlUnwind
SetHandleCount
SetLastError
SizeofResource
Sleep
TerminateProcess
VariantChangeType
VariantInit
VariantClear
SysStringLen
SysStringByteLen
SysFreeString
SysAllocStringLen
SysAllocStringByteLen
SysAllocString
SafeArrayUnaccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
OleCreatePropertyFrame
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
GetDeviceCaps
DeleteMetaFile
DeleteDC
Rectangle
CreateMetaFileA
CreateCompatibleDC
CloseMetaFile
RestoreDC
SaveDC
SetTextAlign
SetWindowExtEx
SetWindowOrgEx
StretchBlt
TextOutA
CreateRectRgnIndirect
DelItemString
Mem_Malloc
Module_GetFilename
vSetTargetWPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ