GetPointer
InPlaceAdd
String_AsString
read_end
vInit
Static task
static1
Behavioral task
behavioral1
Sample
9a009a6352d0b248bb29f2676e64b5b090f1a6e249ea303935381e869b5e2d0b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9a009a6352d0b248bb29f2676e64b5b090f1a6e249ea303935381e869b5e2d0b.dll
Resource
win10v2004-20220812-en
Target
9a009a6352d0b248bb29f2676e64b5b090f1a6e249ea303935381e869b5e2d0b
Size
630KB
MD5
9ad86f08e26821d48448146dd1bb8f69
SHA1
22bddabcaa4e911082b5a257c390092b2fb2e71a
SHA256
9a009a6352d0b248bb29f2676e64b5b090f1a6e249ea303935381e869b5e2d0b
SHA512
43a5be979b90fe9350573b8cd125dfddb72d9118743949d041b047843f8746b6ee9080e7abdc032bbc2bb6f111b38638bcffed741662acf99a7fc53c9b8b9c49
SSDEEP
12288:P4PlESHY6LdDULeE2XBVeYYVD4palJMk+S4Y54kHXX+NtYrILfj4ultm:wPlEuLdwyHXXYVHKkBF5F38t4I7jC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindFirstFileA
FreeEnvironmentStringsA
FreeLibrary
FreeResource
FreeUserPhysicalPages
GetACP
GetCPInfo
GetCommandLineA
GetConsoleDisplayMode
GetCurrentConsoleFont
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetHandleInformation
GetLastError
GetLocaleInfoA
GetLogicalDrives
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessIoCounters
GetProcessPriorityBoost
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTimeAsFileTime
GetTapePosition
GetTapeStatus
GetThreadLocale
GetThreadPriority
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalDeleteAtom
GlobalFix
GlobalFree
GlobalHandle
GlobalLock
CreateEventA
GlobalReAlloc
GlobalUnlock
Heap32ListNext
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadModule
LocalAlloc
LocalFileTimeToFileTime
LocalReAlloc
Module32FirstW
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
ResumeThread
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetLastError
SetProcessAffinityMask
SetThreadExecutionState
SetThreadLocale
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
_lopen
lstrcpynA
CreateConsoleScreenBuffer
ConvertDefaultLocale
CloseHandle
GlobalMemoryStatus
AllocConsole
RegCloseKey
CreateTraceInstanceId
AreAllAccessesGranted
RegOpenKeyExA
GetKeyboardType
LoadStringA
keybd_event
EnumThreadWindows
wsprintfA
GetKeyboardLayout
VarR4FromI2
VariantInit
VariantCopyInd
VariantChangeType
VarI1FromDate
VarCyFromUI4
LPSAFEARRAY_Unmarshal
SafeArrayGetElement
SafeArrayGetLBound
SysFreeString
SysReAllocStringLen
VarBoolFromR4
VarCmp
CM_Get_Sibling
SetupUninstallNewlyCopiedInfs
SetupOpenLog
SetupDiInstallDevice
SetupDiDeleteDeviceInterfaceData
SetupCloseInfFile
htonl
ntohl
socket
WSACancelAsyncRequest
GetPointer
InPlaceAdd
String_AsString
read_end
vInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ