Display
SimpleParseFileFlags
_DelItem
_DelSlice
write_chunk_data
Static task
static1
Behavioral task
behavioral1
Sample
6b68e8f89d2e8f6315d390d050acf61359dea62a25a7d79c4f2638eae1cbfeeb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b68e8f89d2e8f6315d390d050acf61359dea62a25a7d79c4f2638eae1cbfeeb.dll
Resource
win10v2004-20221111-en
Target
6b68e8f89d2e8f6315d390d050acf61359dea62a25a7d79c4f2638eae1cbfeeb
Size
422KB
MD5
d094908caf831a0f0f5a1c9ef662e5c9
SHA1
f4201ef3b00e8a07f3dc5411677aba3f7ff7aae5
SHA256
6b68e8f89d2e8f6315d390d050acf61359dea62a25a7d79c4f2638eae1cbfeeb
SHA512
0a5947f3442f88442d8ad13a06c0304ed47e28282f62955d9339951f216360f8259ab3d8933713bc3314dd6cbf6f8938f526c7734062fd1e83e1d8791429dda3
SSDEEP
12288:NDOhIO/YHb1H2JJEQ+eNtnp1FtFXvjJiyQX1:U6MY71HkEQ+eN3FFXrJiTX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord17
DirectInputCreateA
GetModuleFileNameW
GetModuleHandleA
GetNamedPipeInfo
GetProcAddress
GetProcessPriorityBoost
GetProcessVersion
GetStartupInfoA
GetStdHandle
GetSystemPowerStatus
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultLCID
GetUserDefaultLangID
GetVersionExA
GlobalAddAtomW
GlobalAlloc
GlobalFindAtomW
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCompact
HeapFree
HeapReAlloc
HeapValidate
InitializeCriticalSection
InterlockedIncrement
IsBadReadPtr
GetMailslotInfo
LoadResource
LocalAlloc
LocalFree
Module32Next
MultiByteToWideChar
OpenProcess
Process32FirstW
Process32NextW
QueryPerformanceCounter
RaiseException
ReadDirectoryChangesW
RtlZeroMemory
SetErrorMode
SetEvent
SetFilePointer
TerminateJobObject
Thread32Next
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualQueryEx
VirtualUnlock
WideCharToMultiByte
WriteFile
WriteFileEx
_lread
lstrcatW
lstrcpynW
lstrlenW
GetLastError
GetFileAttributesW
GetExitCodeThread
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStringsA
GetDevicePowerState
GetCurrentThreadId
GetCurrentProcessId
GetCurrentConsoleFont
GetConsoleWindow
GetCommandLineA
GetCPInfo
GetACP
FreeEnvironmentStringsA
FlushConsoleInputBuffer
EnterCriticalSection
CreateToolhelp32Snapshot
CreateConsoleScreenBuffer
ConnectNamedPipe
BindIoCompletionCallback
BackupRead
AllocateUserPhysicalPages
AllocConsole
LoadLibraryA
DocumentPropertiesW
OpenPrinterW
ClosePrinter
SetRectRgn
SetMapperFlags
SetMapMode
SelectObject
SelectBrushLocal
ScaleWindowExtEx
ScaleViewportExtEx
RestoreDC
PolyBezierTo
OffsetViewportOrgEx
GetStockObject
GetDeviceCaps
GetBkColor
ExcludeClipRect
DeleteDC
CreateSolidBrush
CreateHatchBrush
ColorCorrectPalette
CloseMetaFile
AnimatePalette
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetSystemPaletteUse
GetMenuItemCount
WaitMessage
UnregisterClassW
UnhookWindowsHookEx
AdjustWindowRectEx
CallWindowProcW
CheckMenuItem
ClientToScreen
CloseDesktop
CopyRect
CreatePopupMenu
DispatchMessageW
DrawIconEx
DrawTextW
EnableMenuItem
EnableWindow
EndDeferWindowPos
ExcludeUpdateRgn
FrameRect
GetCapture
GetCaretPos
GetClassInfoW
GetDC
GetDlgItem
GetKeyState
GetKeyboardLayoutList
GetLastActivePopup
GetMenu
GetMenuCheckMarkDimensions
GetMenuState
GetNextDlgTabItem
GetSubMenu
GetSysColorBrush
GetTopWindow
GetWindowLongW
GetWindowRect
GetWindowTextW
IsIconic
LoadCursorW
LookupIconIdFromDirectory
PeekMessageW
PostMessageW
ReleaseCapture
ReleaseDC
ScrollWindowEx
SendMessageW
SetFocus
SetPropW
SetRect
SetWindowLongW
ShowWindow
TabbedTextOutW
ToAscii
Display
SimpleParseFileFlags
_DelItem
_DelSlice
write_chunk_data
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ