AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
Static task
static1
Behavioral task
behavioral1
Sample
8f9cd90aab57f58f2cfb3d0135d72705a62e5b188f402437743793c2bbfc8a7d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f9cd90aab57f58f2cfb3d0135d72705a62e5b188f402437743793c2bbfc8a7d.dll
Resource
win10v2004-20221111-en
Target
8f9cd90aab57f58f2cfb3d0135d72705a62e5b188f402437743793c2bbfc8a7d
Size
222KB
MD5
860b24da6e6da7408161d2db68b5fb7c
SHA1
115be738eb371ebe802f37f9da21a5cfb03dce1d
SHA256
8f9cd90aab57f58f2cfb3d0135d72705a62e5b188f402437743793c2bbfc8a7d
SHA512
3b3aae3b917d7084f3c232b634edd736a026c8d1f41f9a4a59f5d24cc53e820986c17a5e5c7b548c7632ca0b5346b1a9fe4f165be273c105f03135ed61d74495
SSDEEP
6144:p50VXv2MjOAXwESQoMWnkXX2ps5cJq2eN:TCpa7QjXXh5yq2eN
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
DeleteTimerQueueTimer
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageA
FormatMessageW
GetACP
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableW
GetFileSize
GetLastError
GetLocalTime
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersion
GlobalAlloc
GlobalFree
HeapAlloc
HeapCreate
DebugBreak
HeapFree
HeapLock
HeapReAlloc
HeapUnlock
HeapWalk
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
LocalReAlloc
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
RtlUnwind
SetConsoleTextAttribute
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateSemaphoreW
CreateSemaphoreA
CreateFileW
HeapDestroy
CloseHandle
RegOpenKeyExA
RegCloseKey
DeregisterEventSource
RegQueryValueExA
CoCreateInstance
CLSIDFromString
CoTaskMemFree
_stricmp
_ultow
_vsnwprintf
_wcsicmp
_wcsnicmp
_wcsupr
_wtol
iswspace
iswxdigit
memcpy
memmove
memset
strrchr
towupper
wcschr
wcsrchr
wcsstr
wcstol
wcstoul
_snprintf
_itoa
SysAllocString
VariantClear
VariantInit
SysFreeString
_write
_unlock
_purecall
_onexit
_lseeki64
_lock
_isatty
_iob
free
_fileno
_errno
_callnewh
_amsg_exit
__pioinfo
__dllonexit
__badioinfo
_XcptFilter
_CxxThrowException
isleadbyte
malloc
wcstod
_initterm
wctomb
AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ