GetTableInfo
HrCopyStreamCB
HrFillRasCombo
HrIsStreamUnicode
OpenTable
PixelMap
ReplaceCharsW
Static task
static1
Behavioral task
behavioral1
Sample
6ab3076b70d40d5d726ccf1dd6369cd24b88d48d5c68471fcd8593d90e5f3749.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6ab3076b70d40d5d726ccf1dd6369cd24b88d48d5c68471fcd8593d90e5f3749.dll
Resource
win10v2004-20220901-en
Target
6ab3076b70d40d5d726ccf1dd6369cd24b88d48d5c68471fcd8593d90e5f3749
Size
160KB
MD5
5a64a968750662d0f93c44c55560a3d2
SHA1
8b67cfdc99b9aea357bf15f97ed4e663b2dc8a49
SHA256
6ab3076b70d40d5d726ccf1dd6369cd24b88d48d5c68471fcd8593d90e5f3749
SHA512
16c97616037c80fddd6da2de5779f0b2cc2c2580cf4ce5e5e91c3fe16a1b4c62e81fc53531c36f82a419b5add1e051f48f1d53b5992f427383925e4dd7111232
SSDEEP
3072:Qhqr5Z4GTjLO0WcjR5KJgpR4Af7NIR29WCT7igdX+/s4B:YqX4GztLXFz/DCv
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetupDiGetDeviceInterfaceDetailA
lstrlenA
lstrcpyA
CreateDirectoryA
VirtualProtect
VirtualFree
VirtualAlloc
SetCurrentDirectoryA
LocalFree
LoadLibraryA
GetVersionExA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetFileAttributesA
GetCurrentProcess
GetCurrentDirectoryA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
ShowCursor
SetTimer
SetThreadDesktop
SetKeyboardState
GetWindowPlacement
GetCursorInfo
GetClipboardSequenceNumber
GetAsyncKeyState
EnumThreadWindows
EndPaint
DdeSetUserHandle
ChildWindowFromPointEx
CallNextHookEx
BeginPaint
GetIconInfo
SetStretchBltMode
PlayEnhMetaFile
DeleteObject
GetObjectA
GetFontLanguageInfo
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
CreateDIBitmap
StretchBlt
GetBitmapBits
DeleteDC
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
LsaQuerySecret
RegQueryValueExA
StgCreateDocfileOnILockBytes
SHCreateDirectoryExW
GetTableInfo
HrCopyStreamCB
HrFillRasCombo
HrIsStreamUnicode
OpenTable
PixelMap
ReplaceCharsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ