ADoTest
CleanupGlobalTempFiles
CreateContext
GetCursorInfo
Unlock
Static task
static1
Behavioral task
behavioral1
Sample
df0ab513cdd5c6d58c3117e977de837737a05c8473db22d9b2f3063bb1bb5838.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
df0ab513cdd5c6d58c3117e977de837737a05c8473db22d9b2f3063bb1bb5838.dll
Resource
win10v2004-20220812-en
Target
df0ab513cdd5c6d58c3117e977de837737a05c8473db22d9b2f3063bb1bb5838
Size
163KB
MD5
9522dcd7c3bfbfa9e605353da154a5dc
SHA1
d5f00d52de5f6614a0889cb0b41edbac3bdfd00a
SHA256
df0ab513cdd5c6d58c3117e977de837737a05c8473db22d9b2f3063bb1bb5838
SHA512
1abec615e69583596e79c82f9c64d12cd5102a772fcdc3ce42879c2fd80f82f23e6256971fab33811f05b722a847903158b67a8a880e9606f14ea06596d20e1a
SSDEEP
3072:BA4ZgFC/zOhTDwUZE52pdG/VinrbQ+GzVzF1d16EDDK5yWMd/2hL7IyK5mx:RZgE0Ud5odTnQzF1ecDK5yHuhwyb
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateEventA
CreateSemaphoreA
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExitProcess
FlushInstructionCache
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessAffinityMask
GetProcessHeaps
GetThreadContext
GetThreadPriority
GlobalFlags
InitializeCriticalSection
InterlockedDecrement
InterlockedExchangeAdd
IsBadWritePtr
LoadLibraryA
OpenProcess
QueueUserAPC
ReleaseSemaphore
ResetEvent
ResumeThread
SetEvent
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SuspendThread
SwitchToFiber
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnregisterWait
VirtualAlloc
VirtualFree
VirtualProtect
WaitForMultipleObjects
WaitForSingleObject
SHGetDiskFreeSpaceExA
SHGetFolderPathW
ShellHookProc
RegenerateUserEnvironment
_errno
_ftime
_endthreadex
_onexit
_setjmp3
calloc
exit
longjmp
tmpnam
_adjust_fdiv
__dllonexit
_initterm
WSASetLastError
WSAGetLastError
ADoTest
CleanupGlobalTempFiles
CreateContext
GetCursorInfo
Unlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ