AnyFileFlags
BlockPop
Long_AsSsize_t
WriteObject
Static task
static1
Behavioral task
behavioral1
Sample
731e8204dfeb3817514a4240952b8a1935242a904c170e2c92d2b611e786b27e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
731e8204dfeb3817514a4240952b8a1935242a904c170e2c92d2b611e786b27e.dll
Resource
win10v2004-20221111-en
Target
731e8204dfeb3817514a4240952b8a1935242a904c170e2c92d2b611e786b27e
Size
1.5MB
MD5
0476e2753711feec6293a386277b0a2b
SHA1
80805443fc4d96dd801d60f27aced795ac2f6520
SHA256
731e8204dfeb3817514a4240952b8a1935242a904c170e2c92d2b611e786b27e
SHA512
2f89864229f1f7cca4696156bfdbcbf4cb0d6b75f31328d882fb7a9b066ebcd877cb2cfe94f6340dc4e98796d23c140d3af8b3e9505d85beae8bb09e16c74f65
SSDEEP
24576:KZb9HwZ/CFFy71A+RMuilP8OaCKkSTnkUNAojMWX2:0uRPuPrITkn/
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindFirstFileA
FreeEnvironmentStringsA
FreeLibrary
FreeResource
FreeUserPhysicalPages
GetACP
GetCPInfo
GetCommandLineA
GetConsoleDisplayMode
GetCurrentConsoleFont
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetHandleInformation
GetLastError
GetLocaleInfoA
GetLogicalDrives
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessIoCounters
GetProcessPriorityBoost
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTimeAsFileTime
GetTapePosition
GetTapeStatus
GetThreadLocale
GetThreadPriority
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalDeleteAtom
GlobalFix
GlobalFree
GlobalHandle
GlobalLock
CreateEventA
GlobalReAlloc
GlobalUnlock
Heap32ListNext
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadModule
LocalAlloc
LocalFileTimeToFileTime
LocalReAlloc
Module32FirstW
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
ResumeThread
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetLastError
SetProcessAffinityMask
SetThreadExecutionState
SetThreadLocale
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
_lopen
lstrcpynA
CreateConsoleScreenBuffer
ConvertDefaultLocale
CloseHandle
GlobalMemoryStatus
AllocConsole
RegCloseKey
CreateTraceInstanceId
AreAllAccessesGranted
RegOpenKeyExA
GetKeyboardType
LoadStringA
keybd_event
EnumThreadWindows
wsprintfA
GetKeyboardLayout
VarR4FromI2
VariantInit
VariantCopyInd
VariantChangeType
VarI1FromDate
VarCyFromUI4
LPSAFEARRAY_Unmarshal
SafeArrayGetElement
SafeArrayGetLBound
SysFreeString
SysReAllocStringLen
VarBoolFromR4
VarCmp
CM_Get_Sibling
SetupUninstallNewlyCopiedInfs
SetupOpenLog
SetupDiInstallDevice
SetupDiDeleteDeviceInterfaceData
SetupCloseInfFile
htonl
ntohl
socket
WSACancelAsyncRequest
AnyFileFlags
BlockPop
Long_AsSsize_t
WriteObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ