ConvertToExifTiffeX
CopyClickWBCoefs
CreateBlockReaderInterface
D3D10SetDirect3DDevice
D3D9GetDevice
D3D9ResourceGetMappedArray
EjectLoadCD
EnumDeviceRelease
EnumImageItemPropertyReset
GetDriveMode
GetMyColorDataProps
HostAlloc
Malloc
Memcpy2D
Static task
static1
Behavioral task
behavioral1
Sample
00f697f0ed25c216eff46fad59868e44f4793ac57caa81f462118b6e9aede5c3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
00f697f0ed25c216eff46fad59868e44f4793ac57caa81f462118b6e9aede5c3.dll
Resource
win10v2004-20221111-en
Target
00f697f0ed25c216eff46fad59868e44f4793ac57caa81f462118b6e9aede5c3
Size
328KB
MD5
6fb6c3e0d1303336f85999edf8279940
SHA1
f6ee958d521d3115bf7849bf58d241194a884b66
SHA256
00f697f0ed25c216eff46fad59868e44f4793ac57caa81f462118b6e9aede5c3
SHA512
63865b514568e70b6e15e726007346720b28159cd7653b649391fa1186c90f34519b8c4c3453b2988398c2499beb77fd62bbd2e170bc9d5a817deca58a653b03
SSDEEP
6144:mjudplKkZ34XBZnXyy95gbbR95bPEF6EyDpvf+RE+YP4MR5HAp//ibyeUD:gudplD34XniAco8X4qA9gybD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DisableThreadLibraryCalls
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
DeleteCriticalSection
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
InterlockedDecrement
InitializeCriticalSection
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcatA
SetEnvironmentVariableA
ResumeThread
CreateThread
WaitForSingleObject
InterlockedIncrement
lstrcpyA
lstrlenA
CloseHandle
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
EnterCriticalSection
IsDBCSLeadByte
lstrcpynA
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetOEMCP
WriteFile
GetEnvironmentStringsW
ExitProcess
TerminateProcess
SetLastError
TlsFree
TlsGetValue
GetVersion
GetCommandLineA
TlsAlloc
GetCurrentProcess
GetEnvironmentStrings
GetSystemTime
GetTimeZoneInformation
GetLocalTime
HeapAlloc
HeapReAlloc
RaiseException
ExitThread
TlsSetValue
HeapFree
RtlUnwind
InterlockedExchange
GetCurrentThreadId
UnhandledExceptionFilter
GetEnvironmentVariableA
HeapCreate
VirtualFree
LeaveCriticalSection
GetVersionExA
FreeEnvironmentStringsW
GetACP
CompareStringW
CompareStringA
GetCPInfo
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetStartupInfoA
IsBadWritePtr
VirtualAlloc
SetHandleCount
LoadStringA
CharNextA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
CoUninitialize
ProgIDFromCLSID
CoTaskMemFree
CoInitializeEx
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
StringFromGUID2
VARIANT_UserFree
SystemTimeToVariantTime
VarDateFromUdate
SafeArrayGetDim
VariantChangeType
SafeArrayDestroy
SafeArrayCreate
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
SafeArrayAccessData
SafeArrayUnaccessData
VarUI4FromStr
RegisterTypeLi
LoadTypeLi
BSTR_UserUnmarshal
BSTR_UserSize
BSTR_UserMarshal
VARIANT_UserUnmarshal
BSTR_UserFree
VARIANT_UserSize
CreateErrorInfo
SysStringLen
LoadRegTypeLi
VariantCopy
SetErrorInfo
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
VARIANT_UserMarshal
VarUdateFromDate
CStdStubBuffer_Disconnect
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
IUnknown_QueryInterface_Proxy
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrCStdStubBuffer_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrOleAllocate
NdrOleFree
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_Connect
CStdStubBuffer_QueryInterface
CStdStubBuffer_AddRef
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_Invoke
CStdStubBuffer_CountRefs
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
ConvertToExifTiffeX
CopyClickWBCoefs
CreateBlockReaderInterface
D3D10SetDirect3DDevice
D3D9GetDevice
D3D9ResourceGetMappedArray
EjectLoadCD
EnumDeviceRelease
EnumImageItemPropertyReset
GetDriveMode
GetMyColorDataProps
HostAlloc
Malloc
Memcpy2D
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ