Long_AsSsize_t
Number_Index
Number_Negative
ParseFileFlagsEx
SyntaxLocation
set_error_fn
vLoadModule
Static task
static1
Behavioral task
behavioral1
Sample
97916ee36caed0c03fb2a0ac9366a4f10ebcd0f770b73303842702ecfe10596a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
97916ee36caed0c03fb2a0ac9366a4f10ebcd0f770b73303842702ecfe10596a.dll
Resource
win10v2004-20221111-en
Target
97916ee36caed0c03fb2a0ac9366a4f10ebcd0f770b73303842702ecfe10596a
Size
635KB
MD5
8b52931c900f84896286d1d1a19706be
SHA1
05a787ac0ca33ac7f62d154ca0741b7605c5dee1
SHA256
97916ee36caed0c03fb2a0ac9366a4f10ebcd0f770b73303842702ecfe10596a
SHA512
3bcaedfa130576c499276d7347e049b0c4fc39baa0fb367cc8794c5d755c8dd8a54f62ba424e044633396a13bc917b90fabc0eadc0b88d924fe66fd2f2aed2d4
SSDEEP
12288:8yww+Be5BAivP1K9UfnXTMTLtdKFh+nHS7sN3y0j1oNyCX+20HRc:8yf+BeDAivP1EcnXTCLfsh4S7boQ+20e
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindFirstFileA
FreeEnvironmentStringsA
FreeLibrary
FreeResource
FreeUserPhysicalPages
GetACP
GetCPInfo
GetCommandLineA
GetConsoleDisplayMode
GetCurrentConsoleFont
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetHandleInformation
GetLastError
GetLocaleInfoA
GetLogicalDrives
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessIoCounters
GetProcessPriorityBoost
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTimeAsFileTime
GetTapePosition
GetTapeStatus
GetThreadLocale
GetThreadPriority
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalDeleteAtom
GlobalFix
GlobalFree
GlobalHandle
GlobalLock
CreateEventA
GlobalReAlloc
GlobalUnlock
Heap32ListNext
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadModule
LocalAlloc
LocalFileTimeToFileTime
LocalReAlloc
Module32FirstW
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
ResumeThread
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetLastError
SetProcessAffinityMask
SetThreadExecutionState
SetThreadLocale
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
_lopen
lstrcpynA
CreateConsoleScreenBuffer
ConvertDefaultLocale
CloseHandle
GlobalMemoryStatus
AllocConsole
RegCloseKey
CreateTraceInstanceId
AreAllAccessesGranted
RegOpenKeyExA
GetKeyboardType
LoadStringA
keybd_event
EnumThreadWindows
wsprintfA
GetKeyboardLayout
VarR4FromI2
VariantInit
VariantCopyInd
VariantChangeType
VarI1FromDate
VarCyFromUI4
LPSAFEARRAY_Unmarshal
SafeArrayGetElement
SafeArrayGetLBound
SysFreeString
SysReAllocStringLen
VarBoolFromR4
VarCmp
CM_Get_Sibling
SetupUninstallNewlyCopiedInfs
SetupOpenLog
SetupDiInstallDevice
SetupDiDeleteDeviceInterfaceData
SetupCloseInfFile
htonl
ntohl
socket
WSACancelAsyncRequest
Long_AsSsize_t
Number_Index
Number_Negative
ParseFileFlagsEx
SyntaxLocation
set_error_fn
vLoadModule
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ