AsCComplex
Contains
Free
Instance_Type
mem_level
set_read_fn
Static task
static1
Behavioral task
behavioral1
Sample
96e6a732df440ec6a21c3957b60dd02d417613b0ff9cade1c2a0d5e5444d192f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96e6a732df440ec6a21c3957b60dd02d417613b0ff9cade1c2a0d5e5444d192f.dll
Resource
win10v2004-20221111-en
Target
96e6a732df440ec6a21c3957b60dd02d417613b0ff9cade1c2a0d5e5444d192f
Size
363KB
MD5
d3a5220c676f5d41cc561845aabe0b72
SHA1
5b31036662a91f5df1fd936f34dc698326fb1e43
SHA256
96e6a732df440ec6a21c3957b60dd02d417613b0ff9cade1c2a0d5e5444d192f
SHA512
c72743fa9d30df4f2439cb4ffae25497d66b8f857bec2d04d71eb3d8bdc6810ec1f7a64e4afc472ad38cb14c389cddb7aa4d3144b33225bc91f54ad81cf34c60
SSDEEP
6144:bY+p3xtQLe322BSivCw4LE4uphBDIwD9+C8Nw:3fMe3222LEFVDIm8C
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentThreadId
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetSystemInfo
GetTickCount
GetUserDefaultLangID
GetWindowsDirectoryA
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
GetCommandLineA
LeaveCriticalSection
MultiByteToWideChar
OpenProcess
OutputDebugStringA
Process32First
Process32Next
QueryPerformanceCounter
RaiseException
RtlUnwind
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
Sleep
TerminateProcess
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
lstrlenA
GetCPInfo
GetACP
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FlushFileBuffers
ExitProcess
EnterCriticalSection
DeleteFileA
CreateToolhelp32Snapshot
CreateProcessA
CreateFileA
CopyFileA
LCMapStringW
CloseHandle
SetupOpenInfFileA
SetupGetLineTextA
SetupDiSetClassInstallParamsA
SetupDiOpenDevRegKey
SetupDiGetSelectedDriverA
SetupDiGetDriverInfoDetailA
SetupDiCallClassInstaller
SetupCloseInfFile
DeleteAce
CopySid
AccessCheck
ImpersonateLoggedOnUser
LookupAccountNameA
LookupAccountSidA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegSetValueExA
RevertToSelf
SystemFunction008
GetTokenInformation
AsCComplex
Contains
Free
Instance_Type
mem_level
set_read_fn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ