_IWMPEvents@16
calloc
free
malloc
memmove
realloc
Static task
static1
Behavioral task
behavioral1
Sample
8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d.dll
Resource
win10v2004-20220812-en
Target
8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d
Size
23KB
MD5
439f88bea8f29148cd4caf720f531840
SHA1
5d5232bd07c58810eea4965eb04ed47e34b093da
SHA256
8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d
SHA512
af9e90c706737cbc317a3f8a6c3222de9a602f32c0e655e560f99066cb801fe5070b9920073762453710e35afb4254db9c756c6211534858fba4ff33a3ed5d92
SSDEEP
384:KA/aKe1URKrnt38RW5EUnLGp1hPYXBGaBTi9xIzDVJ5zG:C1URUXuULeaw2fVJ4
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetFileAttributesA
SetFileAttributesA
DeleteFileA
GetShortPathNameA
ExpandEnvironmentStringsA
GetModuleFileNameA
MultiByteToWideChar
CreateFileA
lstrlenA
lstrcpyA
VirtualAllocEx
lstrcatA
GetEnvironmentVariableA
CloseHandle
ReadFile
GetFileSize
WriteFile
SetFilePointer
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
HeapSize
ReadProcessMemory
VirtualFreeEx
GetVolumeInformationA
WriteProcessMemory
GetMessageA
SetWindowsHookExA
wsprintfA
CallNextHookEx
DispatchMessageA
TranslateMessage
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
StrStrA
CoCreateInstance
WSAGetLastError
WSASetLastError
_IWMPEvents@16
calloc
free
malloc
memmove
realloc
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ