EvalCodeEx
GetBuiltins
Int_GetMax
Next
Number_ToBase
ReloadModule
SimpleParseString
Static task
static1
Behavioral task
behavioral1
Sample
6c0958612f9221575b93b69b9c53ceaa0de8a793b00555e30d4832573fcdc752.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c0958612f9221575b93b69b9c53ceaa0de8a793b00555e30d4832573fcdc752.dll
Resource
win10v2004-20221111-en
Target
6c0958612f9221575b93b69b9c53ceaa0de8a793b00555e30d4832573fcdc752
Size
507KB
MD5
1844d634ed92016d847c9073ccda7de0
SHA1
3da9593ec192dfc886ab29d5cf7d59a16c630b4e
SHA256
6c0958612f9221575b93b69b9c53ceaa0de8a793b00555e30d4832573fcdc752
SHA512
f0b20ebad054ad980a52f387507935313a7bcb611f1527ffac6e0d6b2d4a37b402067a95d844d6714a56a5b6b44a742c0e9063b007590736c9c290f86bbdef04
SSDEEP
12288:NpY9Hy0Sw3DjzhiJvvY/qxZXmviulCzj0yf+mibLf+8:T+d3n4JvvtxMvO0HmyLf+8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VariantInit
VariantCopyInd
VariantCopy
VariantClear
VariantChangeType
VarUI2FromDate
VarCmp
SysReAllocStringLen
SysFreeString
SysAllocStringLen
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElement
LPSAFEARRAY_Unmarshal
RegOpenKeyExA
RegCloseKey
AreAllAccessesGranted
RegQueryValueExA
GetKeyboardType
EnumThreadWindows
CreateIconIndirect
CharNextA
LoadStringA
wsprintfA
ntohl
ntohs
socket
htonl
SetFileTime
SetFilePointerEx
SetFilePointer
SetEvent
SetEnvironmentVariableA
SetHandleCount
RtlUnwind
ResetEvent
ReadFile
RaiseException
QueryPerformanceCounter
MultiByteToWideChar
SetLastError
SetThreadLocale
SystemTimeToFileTime
SetEndOfFile
GetProcAddress
lstrlenA
lstrcpynA
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAlloc
TlsSetValue
TlsGetValue
TlsFree
CloseHandle
CompareStringA
CreateEventA
CreateFileA
DeleteCriticalSection
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FindClose
FindFirstFileA
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
FreeUserPhysicalPages
GetACP
GetCPInfo
GetCommandLineA
GetConsoleDisplayMode
GetConsoleScreenBufferInfo
GetCurrentConsoleFont
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetEnvironmentStringsA
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileType
GetFullPathNameA
GetHandleInformation
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
LocalFree
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFileTimeToFileTime
TlsAlloc
SetupUninstallNewlyCopiedInfs
SetupOpenLog
SetupDiDeleteDeviceInterfaceData
SetupCloseInfFile
CM_Get_Sibling
CM_Set_DevNode_Problem
EvalCodeEx
GetBuiltins
Int_GetMax
Next
Number_ToBase
ReloadModule
SimpleParseString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ