CloseBlock
CreateTextureShader
ReadAttribute2
TypeToAdsTypeDNWithString
WeldVertices
Static task
static1
Behavioral task
behavioral1
Sample
78f50e587ed176a7cd3076644486ff41401b3e421ca1fd47b84bd63d69c66abc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
78f50e587ed176a7cd3076644486ff41401b3e421ca1fd47b84bd63d69c66abc.dll
Resource
win10v2004-20220812-en
Target
78f50e587ed176a7cd3076644486ff41401b3e421ca1fd47b84bd63d69c66abc
Size
401KB
MD5
71527e383e3e5ef24f69b602204a3489
SHA1
5b074cd83ceb873434cadbc2ecd61910298bda97
SHA256
78f50e587ed176a7cd3076644486ff41401b3e421ca1fd47b84bd63d69c66abc
SHA512
3ff1dcb8ab350908420da67ca9085e9da460a53326cb97fdd291950a64031ace418a6c37a43defb06840c0a1194a7449cb0cd260b4911d9e5276e7d36bc1e7ed
SSDEEP
12288:iqkeX48kJCktKzFY9wbn11+mjoHdk3Squg:i18kJCkMF/nvPk9k3Sqr
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegOpenKeyExA
RegOpenKeyExW
RegCloseKey
ClearCommBreak
CloseHandle
CompareFileTime
CreateDirectoryA
CreateFileA
CreateFileMappingA
DebugBreak
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FormatMessageA
FreeLibrary
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetSystemTimeAsFileTime
GetTickCount
GetVersion
GetVersionExA
HeapAlloc
HeapFree
InterlockedCompareExchange
InterlockedExchange
IsBadStringPtrA
LoadLibraryA
LoadResource
LocalFree
LockResource
MapViewOfFile
MultiByteToWideChar
OpenProcess
OutputDebugStringA
Process32FirstW
QueryPerformanceCounter
ReadFile
RtlUnwind
SearchPathA
SetCriticalSectionSpinCount
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SetWaitableTimer
SystemTimeToFileTime
TerminateProcess
Thread32First
UnmapViewOfFile
VirtualAlloc
VirtualAllocEx
VirtualFreeEx
WideCharToMultiByte
WriteFile
WriteProcessMemory
lstrcmpA
lstrlenA
lstrlenW
DispatchMessageA
EnumChildWindows
EnumWindows
GetClassNameA
GetWindowThreadProcessId
PeekMessageA
SetWindowTextA
TranslateMessage
wsprintfW
CoUninitialize
CoInitialize
CoCreateInstance
ImageRvaToVa
SymEnumSymbols
SymFindFileInPath
SymFunctionTableAccess
SymGetSymFromName64
SymGetTypeInfo
ImageNtHeader
_XcptFilter
__badioinfo
__dllonexit
__mb_cur_max
__pioinfo
_amsg_exit
_atoi64
_clearfp
_errno
_fileno
_initterm
_iob
_isatty
_ismbblead
_itoa
_lock
_logb
_lseeki64
_mbctohira
_mbslen
_onexit
_purecall
_snprintf
_stricmp
_strlwr
_strnicmp
_strrev
_strtime
_unlock
_wcsicmp
_write
atoi
calloc
clock
fclose
fopen
fprintf
free
isalpha
isdigit
isleadbyte
isspace
isupper
isxdigit
localeconv
malloc
mbtowc
memcpy
memset
printf
realloc
sprintf
strchr
strncmp
strrchr
strstr
strtol
strtoul
swprintf
tolower
ungetc
wcschr
wcsncmp
wcsncpy
wcsrchr
wcsstr
wctomb
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
CloseBlock
CreateTextureShader
ReadAttribute2
TypeToAdsTypeDNWithString
WeldVertices
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ