Bufferi
CheckURLScheme
CreateCubeTexture
GatherFragmentsFromFileA
GetSockaddrType
PlaneTransformArray
QueryAllDataW
SourceUnqueueBuffers
TypeToLdapTypeCopyTime
Static task
static1
Behavioral task
behavioral1
Sample
c88cb02a5bb22e1a021c70dc84bec8c14cb4411e8ce0c4de8a79ec4d2290083f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c88cb02a5bb22e1a021c70dc84bec8c14cb4411e8ce0c4de8a79ec4d2290083f.dll
Resource
win10v2004-20220901-en
Target
c88cb02a5bb22e1a021c70dc84bec8c14cb4411e8ce0c4de8a79ec4d2290083f
Size
406KB
MD5
a2109386c66c1bd3cbcc16514e0e9b90
SHA1
8f50805afa33693eca8a1b1c9ded7c060d869501
SHA256
c88cb02a5bb22e1a021c70dc84bec8c14cb4411e8ce0c4de8a79ec4d2290083f
SHA512
2c9a21f7f7aa51442c2e6ace43e45cda629fb03d6bc1863ef86770f699f8cac99ada88e417c0e170edce0df6e458c5ae2531a3db74efe051a4898fbf13c0c318
SSDEEP
12288:nWjS+bJPgit0CvTtN1sx4W+wwo1/5A7P:n4S+bJP5xbtN26o1/54
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
LsaLookupPrivilegeValue
CoTaskMemFree
StringFromCLSID
lstrlenW
WideCharToMultiByte
WaitForSingleObject
CancelDeviceWakeupRequest
CreateFileA
CreateProcessA
DeleteCriticalSection
ExitProcess
GetACP
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetLastError
GetLocaleInfoA
GetLongPathNameA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
GetShortPathNameA
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryA
QueryPerformanceCounter
RtlMoveMemory
SetFileTime
VirtualAlloc
VirtualLock
VirtualProtect
VirtualUnlock
Bufferi
CheckURLScheme
CreateCubeTexture
GatherFragmentsFromFileA
GetSockaddrType
PlaneTransformArray
QueryAllDataW
SourceUnqueueBuffers
TypeToLdapTypeCopyTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ