AnyFileEx
CallFunction
InPlaceDivide
MemberDescr_Type
Proxy_Type
ReleaseThread
_SetSlice
set_strip_16
Static task
static1
Behavioral task
behavioral1
Sample
416a93ef804199c49877d94144eac48ea9466725329634081fb9b9229a19576b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
416a93ef804199c49877d94144eac48ea9466725329634081fb9b9229a19576b.dll
Resource
win10v2004-20220901-en
Target
416a93ef804199c49877d94144eac48ea9466725329634081fb9b9229a19576b
Size
567KB
MD5
3b1d1cf48880d47a9ecddd0e1dd5f86d
SHA1
eb03d948460a092d3278c1a7974a3b5654dfd4df
SHA256
416a93ef804199c49877d94144eac48ea9466725329634081fb9b9229a19576b
SHA512
673ea69a976cf2a3b91417e0eb899aba82d3a50f31f27dde98793b0d1008a7d4ab9f0f49733857e02f9c06ec4f2f5f1fd2324dd0768be4272bad58cbfbe44c30
SSDEEP
6144:B4p6MDAo+B37SssUuPPxyI6WfJAqT6weB0kgzHTDGj7Uqus+lobJhaKHYW7PoaNo:6p9j+ZSNUMoqatRBgzHTkvW+ztaz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
UnhookWindowsHookEx
ShowWindow
SetWindowsHookExA
SetFocus
RegisterClipboardFormatA
MoveWindow
IsZoomed
IsWindowVisible
IsIconic
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
GetForegroundWindow
DestroyWindow
CreateDialogParamA
CharNextW
CharNextA
CallNextHookEx
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
CreateDataAdviseHolder
StringFromGUID2
lstrlenW
lstrlenA
lstrcmpiA
WriteFile
WideCharToMultiByte
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
TerminateProcess
Sleep
SizeofResource
SetUnhandledExceptionFilter
SetLastError
SetHandleCount
RtlUnwind
RaiseException
QueryPerformanceCounter
MultiByteToWideChar
LoadResource
LeaveCriticalSection
LCMapStringW
LCMapStringA
IsValidCodePage
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
IsDebuggerPresent
VariantClear
VarUI4FromStr
UnRegisterTypeLi
SysStringLen
SysFreeString
SysAllocString
RegisterTypeLi
LoadTypeLi
AnyFileEx
CallFunction
InPlaceDivide
MemberDescr_Type
Proxy_Type
ReleaseThread
_SetSlice
set_strip_16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ