ParseFile
SimpleParseStringFlags
get_filter_type
get_gAMA_fixed
start_read_image
vSetTargetWPath
Static task
static1
Behavioral task
behavioral1
Sample
3d7eddc725619ee2b62a8a0abcdec89733e02402017e27b35c51a09d19fd8429.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3d7eddc725619ee2b62a8a0abcdec89733e02402017e27b35c51a09d19fd8429.dll
Resource
win10v2004-20221111-en
Target
3d7eddc725619ee2b62a8a0abcdec89733e02402017e27b35c51a09d19fd8429
Size
596KB
MD5
910b14b3318fd7c06bd460a1b6bb92fd
SHA1
d34060d3ba6b1086fa4d5fae21ed58c34a51b1fe
SHA256
3d7eddc725619ee2b62a8a0abcdec89733e02402017e27b35c51a09d19fd8429
SHA512
6b32fa55c9cd846fcc6272d17569e87b7205e4ab00868bf21741d486d092a3e94c850faae4dc40dd18cf0f88169e123c8eb27d3bed839bd9807af9138a0222e6
SSDEEP
12288:tCR8QLQPMM53p/PIJWDCTy8oFXWuXzJ9uZIs:t8LLSMM5dQWGm8juXz6I
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentThreadId
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetSystemInfo
GetTickCount
GetUserDefaultLangID
GetWindowsDirectoryA
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
GetCommandLineA
LeaveCriticalSection
MultiByteToWideChar
OpenProcess
OutputDebugStringA
Process32First
Process32Next
QueryPerformanceCounter
RaiseException
RtlUnwind
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
Sleep
TerminateProcess
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
lstrlenA
GetCPInfo
GetACP
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FlushFileBuffers
ExitProcess
EnterCriticalSection
DeleteFileA
CreateToolhelp32Snapshot
CreateProcessA
CreateFileA
CopyFileA
LCMapStringW
CloseHandle
RevertToSelf
RegSetValueExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupAccountSidA
LookupAccountNameA
ImpersonateLoggedOnUser
GetTokenInformation
DeleteAce
CopySid
AccessCheck
SystemFunction008
SetupCloseInfFile
SetupDiCallClassInstaller
SetupDiGetDriverInfoDetailA
SetupDiGetSelectedDriverA
SetupDiOpenDevRegKey
SetupDiSetClassInstallParamsA
SetupGetLineTextA
SetupOpenInfFileA
ParseFile
SimpleParseStringFlags
get_filter_type
get_gAMA_fixed
start_read_image
vSetTargetWPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ