Format
GetItemString
Proxy_New
ZeroDivisionError
_Clear
get_user_chunk_ptr
set_cHRM
Static task
static1
Behavioral task
behavioral1
Sample
4c59530620be735ed3cde734a3c5095257969b8ccda6aef976749e3386d29aa3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c59530620be735ed3cde734a3c5095257969b8ccda6aef976749e3386d29aa3.dll
Resource
win10v2004-20220812-en
Target
4c59530620be735ed3cde734a3c5095257969b8ccda6aef976749e3386d29aa3
Size
514KB
MD5
e176adac32f5c6cc7fed24849ce338b0
SHA1
28a05f45db4caf07c97c5064c4ac1a119080f047
SHA256
4c59530620be735ed3cde734a3c5095257969b8ccda6aef976749e3386d29aa3
SHA512
488fb83aca8393269bd66a58a8b1eaaef6108667387fd363c4095b874fac6eaaaacd4d5bbfb3cd4ffffa0623596b44c01418e55f7c1c458e546b830f625472d3
SSDEEP
12288:oF0XuePDnvaaRhIwjr8ZP6wDcGtlbdRPp/7JRx:oF0XumvaaRhIwjr6PBtFPp/t
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
socket
ntohs
ntohl
htonl
SetupDiDeleteDeviceInterfaceData
CM_Get_Log_Conf_Priority_Ex
SetupCancelTemporarySourceList
SetupUninstallNewlyCopiedInfs
CM_Detect_Resource_Conflict
lstrlenA
lstrcpynA
WriteFile
WideCharToMultiByte
WaitForSingleObject
CloseHandle
CompareStringA
CreateEventA
CreateFileA
DeleteCriticalSection
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FindClose
FindFirstFileA
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetEnvironmentStringsA
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GetWriteWatch
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapFree
VirtualQuery
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFileTimeToFileTime
LocalFree
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
ResetEvent
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetNamedPipeHandleState
SetThreadLocale
SetThreadPriority
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
InitializeCriticalSection
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ImpersonateAnonymousToken
EnumThreadWindows
GetKeyboardType
LoadStringA
wsprintfA
CharNextA
CreateIconIndirect
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VarCmp
VarUI2FromDate
VariantChangeType
VariantClear
VariantCopy
VariantCopyInd
VariantInit
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElement
LPSAFEARRAY_Unmarshal
Format
GetItemString
Proxy_New
ZeroDivisionError
_Clear
get_user_chunk_ptr
set_cHRM
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ