AnyFile
ExecCodeModuleEx
Module_GetDict
WriteUnraisable
set_PLTE
Static task
static1
Behavioral task
behavioral1
Sample
b8fae97f7167dcd1920593fa279cb0a4db7afc0c72993d81472c0b4c8559149b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b8fae97f7167dcd1920593fa279cb0a4db7afc0c72993d81472c0b4c8559149b.dll
Resource
win10v2004-20220812-en
Target
b8fae97f7167dcd1920593fa279cb0a4db7afc0c72993d81472c0b4c8559149b
Size
457KB
MD5
08314c530b30948d9daaae6f50987960
SHA1
d988600f0c0806cdf1765c4b3c08d37dd50c4b01
SHA256
b8fae97f7167dcd1920593fa279cb0a4db7afc0c72993d81472c0b4c8559149b
SHA512
f4eea7942437c76e11c8ceb883719e52aae612f23dfd16c91fa31961bcdf514012b2836f79ce6363d7ed2957498a771bb7da50be5cb412f30ab66fcf94aa1ea1
SSDEEP
6144:q44QB8HUW/7ZLphEsGMFhgqMSaD7BI59p2QuBw6yU1uZQK6q6+ObQ1OZJSYonwrV:qeQ7ZLphKqZMn7B29p2o4IC20r4+V
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ntohs
htons
htonl
ord1142
SetupSetFileQueueFlags
SetupDiGetDeviceInterfaceAlias
SetupDiCreateDeviceInfoList
CM_Run_Detection
CM_Request_Eject_PC_Ex
CM_Get_Device_ID_Size_Ex
CM_Enumerate_Classes
VariantInit
VariantCopyInd
VariantCopy
VariantClear
VarUI4FromStr
VarUI2FromDate
VARIANT_UserMarshal
SysFreeString
SysAllocStringLen
SafeArrayRedim
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
SystemTimeToFileTime
SetThreadLocale
WriteFile
SetHandleCount
SetFileTime
SetFilePointer
SetEvent
SetEnvironmentVariableA
SetEndOfFile
RtlUnwind
ResetEvent
ReadFile
RaiseException
QueryPerformanceCounter
MultiByteToWideChar
lstrcpynA
lstrlenA
SetLastError
GetStartupInfoA
CloseHandle
CompareStringA
CreateEventA
CreateFileA
DeleteCriticalSection
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FindClose
FindFirstFileA
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetEnvironmentStringsA
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
LocalFree
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFileTimeToFileTime
GetSystemMetrics
LoadStringA
MessageBoxA
GetKeyboardType
CharNextA
EnumThreadWindows
GetDC
AnyFile
ExecCodeModuleEx
Module_GetDict
WriteUnraisable
set_PLTE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ