ConvertToDCF
GetSymbolSize
Static task
static1
Behavioral task
behavioral1
Sample
8df250a89a5f76cf150c6258326d7c43b2fd3465662dc4df010782c5e7d73086.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8df250a89a5f76cf150c6258326d7c43b2fd3465662dc4df010782c5e7d73086.dll
Resource
win10v2004-20220812-en
Target
8df250a89a5f76cf150c6258326d7c43b2fd3465662dc4df010782c5e7d73086
Size
343KB
MD5
b6ca7bddc6f03972c7303c331b04f3c6
SHA1
4c839d8b1ded0e840a5b26af5f4628da4a4608d1
SHA256
8df250a89a5f76cf150c6258326d7c43b2fd3465662dc4df010782c5e7d73086
SHA512
bf400e211073cb9a1ae956f478458b704def59713aee673c5cd9543ef6d0ac641b0c4a0c051dc705f65e25efc4db73ef5977d2647229977db920f11d9621d696
SSDEEP
6144:xdnv4BnYrbf4s8VU+emHI43Gd2Ju/rkoNwP4o2Pp0ewds:nWn6blXRV/d1rPKP4oHc
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetFolderPathA
FindFirstFileA
FindNextFileA
FindClose
RemoveDirectoryA
GetSystemDefaultLangID
GetFileSize
DeleteFileA
GetVersion
lstrcatA
GetLastError
SetFileAttributesA
CreateDirectoryA
GetFileAttributesA
lstrlenA
MultiByteToWideChar
GetUserDefaultLangID
GetLocaleInfoA
GetModuleFileNameA
LoadLibraryA
LockResource
LoadResource
FindResourceA
FreeLibrary
GetProcAddress
GetCurrentProcess
LocalFree
LocalAlloc
GetVersionExA
IsBadWritePtr
GetCurrentThread
CloseHandle
ReadFile
CreateFileA
SetCurrentDirectoryA
GetCurrentDirectoryA
LocalFileTimeToFileTime
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetTickCount
GetModuleHandleA
GlobalMemoryStatus
Sleep
lstrlenW
WaitForSingleObject
CreateEventA
DeviceIoControl
EnterCriticalSection
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
RaiseException
GetCommandLineA
GetDriveTypeA
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
ExitProcess
FatalAppExitA
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
TerminateProcess
HeapSize
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
GetFullPathNameA
VirtualAlloc
GetStringTypeA
GetStringTypeW
SetFilePointer
FlushFileBuffers
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
GetUserDefaultLCID
IsBadReadPtr
IsBadCodePtr
UnhandledExceptionFilter
SetStdHandle
SetConsoleCtrlHandler
SetEndOfFile
GetLocaleInfoW
SetEnvironmentVariableA
FormatMessageA
RtlUnwind
MessageBoxA
LoadStringA
SysAllocString
SysAllocStringLen
SysFreeString
AllocateAndInitializeSid
SetEntriesInAclA
RegEnumKeyExA
RegEnumValueA
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
AddAccessAllowedAce
InitializeAcl
GetLengthSid
OpenProcessToken
OpenThreadToken
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
ImpersonateSelf
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegDeleteValueA
CoCreateInstance
CoInitialize
CoUninitialize
CoInitializeEx
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
SHDeleteKeyA
ConvertToDCF
GetSymbolSize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ