AddPyObject
File
read_info
set_write_fn
vInitW
write_flush
Static task
static1
Behavioral task
behavioral1
Sample
6fa732a4055642c6d456e57a17a5b32b951c610fcc8567d52dbb8744baaeee58.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6fa732a4055642c6d456e57a17a5b32b951c610fcc8567d52dbb8744baaeee58.dll
Resource
win10v2004-20221111-en
Target
6fa732a4055642c6d456e57a17a5b32b951c610fcc8567d52dbb8744baaeee58
Size
446KB
MD5
52346a21daff3fe05634d2fd1ab43300
SHA1
de06fd03a53e791c0b47679dbde076b367bbe275
SHA256
6fa732a4055642c6d456e57a17a5b32b951c610fcc8567d52dbb8744baaeee58
SHA512
59366ac85a08de0294756d3c348bf039fdb3954ada9ed64b98a86ff46852a8f2fb173c4a242164bbd0b64b330fcbd939628a668e0ae5e67a159f149c81ce331b
SSDEEP
6144:pj93mp032Nb7Db9FpXJq9DnwBiCpBmhe+YyD5FS+5nSjKQdTzRcSXsNtdHMRNgPP:r3eg2NLPO9sD2PH/SjlCSYNMRNG3UCl
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CreateCompatibleDC
CreateFontIndirectW
DeleteDC
DeleteObject
EndDoc
EndPage
ExtTextOutW
GdiFlush
GetDIBits
GetDeviceCaps
GetObjectW
GetStockObject
GetTextExtentPoint32W
GetTextMetricsW
SelectObject
SetBkColor
SetBkMode
SetMapMode
SetTextColor
StartDocW
StartPage
CreateDIBSection
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNumberFormatW
GetOEMCP
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetProfileStringW
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetVersion
GetWindowsDirectoryW
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapFree
FindNextFileW
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MapViewOfFile
MoveFileW
MulDiv
MultiByteToWideChar
OpenProcess
Process32FirstW
GetFullPathNameW
QueryPerformanceCounter
RaiseException
ReadFile
RemoveDirectoryW
ResumeThread
RtlUnwind
SetEndOfFile
SetEnvironmentVariableW
SetErrorMode
SetFileAttributesW
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
FindClose
WritePrivateProfileStringW
WriteProfileStringW
lstrcatW
lstrlenA
lstrlenW
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
ExitThread
ExitProcess
EnterCriticalSection
DeleteFileW
DeleteCriticalSection
CreateToolhelp32Snapshot
CreateThread
CreateProcessW
CreateFileMappingW
CreateFileA
CreateDirectoryW
CloseHandle
GetFileType
GetFileTime
GetFileSize
GetFileAttributesW
GetEnvironmentStringsW
GetEnvironmentStringsA
GetDateFormatW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetConsoleOutputCP
GetConsoleMode
GetConsoleCP
GetCommandLineW
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
Process32NextW
FlushFileBuffers
HeapReAlloc
WritePrivateProfileSectionW
SetSecurityInfo
RevertToSelf
RegUnLoadKeyW
RegSetKeySecurity
RegQueryValueW
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyW
RegOpenKeyExW
RegOpenKeyExA
RegLoadKeyW
RegGetKeySecurity
RegEnumValueW
RegEnumKeyW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
OpenServiceW
OpenSCManagerW
OpenProcessToken
LookupPrivilegeValueW
LookupAccountSidW
LookupAccountNameW
ImpersonateLoggedOnUser
GetTokenInformation
GetSecurityInfo
GetAce
FreeSid
EqualSid
DeleteService
CryptReleaseContext
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptCreateHash
CryptAcquireContextW
CloseServiceHandle
AllocateAndInitializeSid
AdjustTokenPrivileges
RegSetValueW
RegSetValueExW
UnionRect
WaitForInputIdle
TranslateMessage
BeginDeferWindowPos
BeginPaint
CallWindowProcW
CheckDlgButton
CheckMenuItem
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CreateDialogParamW
CreateIconIndirect
CreateWindowExW
DefWindowProcW
DeferWindowPos
DeleteMenu
DestroyIcon
DestroyWindow
DialogBoxIndirectParamW
DialogBoxParamW
DispatchMessageW
DrawFrameControl
DrawIconEx
DrawMenuBar
DrawTextW
EmptyClipboard
EnableMenuItem
EnableWindow
EndDeferWindowPos
EndDialog
EndPaint
EnumChildWindows
EnumDisplaySettingsW
FindWindowExW
FindWindowW
GetClassNameW
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetDlgItemTextW
GetFocus
GetIconInfo
GetMenu
GetMessageW
GetParent
GetPropW
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMetrics
GetWindowLongW
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
InflateRect
InsertMenuW
IntersectRect
InvalidateRect
InvalidateRgn
IsDialogMessageW
IsDlgButtonChecked
IsIconic
IsZoomed
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MapWindowPoints
MessageBoxW
MoveWindow
OffsetRect
OpenClipboard
PostMessageW
PostQuitMessage
PtInRect
RegisterClassExW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageW
SetClipboardData
SetCursor
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetMenuItemInfoW
SetPropW
SetTimer
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
TrackPopupMenu
TranslateAcceleratorW
AddPyObject
File
read_info
set_write_fn
vInitW
write_flush
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ