AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
Static task
static1
Behavioral task
behavioral1
Sample
3851b80b65aaf2909c7e74eff7b48830187ed5f42c7f8fbf3cd0b35f67c3bc4b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3851b80b65aaf2909c7e74eff7b48830187ed5f42c7f8fbf3cd0b35f67c3bc4b.dll
Resource
win10v2004-20221111-en
Target
3851b80b65aaf2909c7e74eff7b48830187ed5f42c7f8fbf3cd0b35f67c3bc4b
Size
231KB
MD5
a59c55cc118d9b6b0e504929d33f8c60
SHA1
613ac6869e6cd1bb1d16b519c7b57273ceebe4b7
SHA256
3851b80b65aaf2909c7e74eff7b48830187ed5f42c7f8fbf3cd0b35f67c3bc4b
SHA512
ef5877c9c3ba4569f8a9fb07e38a73ada70d8d526ab38eafdfc1e175fc8807a19c630d871c032dfcf7ffb3ddc22fdbbdfb20eba0fec01c68ea9ccfc058417879
SSDEEP
6144:lQCPqv6XgGbhX6W7N8Z526TOquQNJUTEb9OMtd:ixvAb1X6O6YQOqucnOMt
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteTimerQueueTimer
DisableThreadLibraryCalls
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FormatMessageA
FormatMessageW
GetACP
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableW
GetFileSize
GetLastError
GetLocalTime
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalFree
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
DeleteCriticalSection
HeapReAlloc
HeapUnlock
HeapWalk
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
LocalReAlloc
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
RtlUnwind
SetConsoleTextAttribute
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
DebugBreak
CreateSemaphoreW
CreateSemaphoreA
HeapLock
CloseHandle
RegOpenKeyExA
RegCloseKey
DeregisterEventSource
RegQueryValueExA
SysAllocString
VarBstrFromCy
VarCyFromI2
VarI4FromI1
VarUI2FromUI4
VariantInit
CoGetCallContext
CoInitializeEx
CoTaskMemFree
StgCreatePropStg
CLSIDFromString
AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ