GetIter
GetPointer
Int_ClearFreeList
IsSubclass
Mem_Realloc
State_New
WriteUnraisable
_Pop
Static task
static1
Behavioral task
behavioral1
Sample
2176d2848119c8fc7a150b444471ccdc7751866576bc31e7f553723687c33e1f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2176d2848119c8fc7a150b444471ccdc7751866576bc31e7f553723687c33e1f.dll
Resource
win10v2004-20221111-en
Target
2176d2848119c8fc7a150b444471ccdc7751866576bc31e7f553723687c33e1f
Size
760KB
MD5
86a962b92964b9163f35b102928371b0
SHA1
ce3366a65e6177bbe5fa3e43fffbb8daacbc31c3
SHA256
2176d2848119c8fc7a150b444471ccdc7751866576bc31e7f553723687c33e1f
SHA512
28c8ac557d4726a3e00ee4c2a9b57ac0d15e524be716cf107caefdf6f230c5afea4c6aef6b96fa44a0388569e9dee68929efec7f5f8765461ede5883ac38a058
SSDEEP
12288:k4RlyDsA74GMnsRI3gr3uaPIjN0wrkSgqLDoCQd:k4/HArKvM+aPqlSqL81
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetClassWord
RegisterWindowMessageA
InterlockedDecrement
lstrcpyA
WriteFile
DisableThreadLibraryCalls
EnterCriticalSection
FreeEnvironmentStringsA
GetACP
GetCommandLineA
GetEnvironmentVariableA
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
GetStartupInfoA
GetStringTypeA
GetTickCount
GetVersion
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
WideCharToMultiByte
InterlockedIncrement
LCMapStringA
LCMapStringW
LeaveCriticalSection
MultiByteToWideChar
RtlUnwind
SetHandleCount
SetLastError
TerminateProcess
VirtualAlloc
VirtualFree
MiniDumpReadDumpStream
SearchTreeForFile
SymEnumTypes
SymInitialize
FindExecutableImageEx
GetIter
GetPointer
Int_ClearFreeList
IsSubclass
Mem_Realloc
State_New
WriteUnraisable
_Pop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ