GetModuleDict
GetPointer
Mem_Realloc
Module_GetDict
ReInitThreads
State_Next
WriteObject
free_data
vSetTargetPathA
Static task
static1
Behavioral task
behavioral1
Sample
e2a90024464e5d442edef3d7250727ef69c3c4a6db91f1e3548271cc5868e3dc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2a90024464e5d442edef3d7250727ef69c3c4a6db91f1e3548271cc5868e3dc.dll
Resource
win10v2004-20220812-en
Target
e2a90024464e5d442edef3d7250727ef69c3c4a6db91f1e3548271cc5868e3dc
Size
500KB
MD5
98037d241588d8b9bfbfa67066c91d81
SHA1
25166fe45cc295ee97152e9254dbcbd735516c1f
SHA256
e2a90024464e5d442edef3d7250727ef69c3c4a6db91f1e3548271cc5868e3dc
SHA512
98eb677c612e289b189c3fec72ee1e9787b6e839387e6b902258fb1075bd9ed925206fa114998c69e6aa5d4eae164154ee6dd2484378bf3cf7fda78c926a1716
SSDEEP
12288:Q8gDp3FBt0wW9oNH4lOZEo31GxtyBsVso/UEUju1RB:QJDp3FBt062cGW4yB8TT+ujB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
socket
ntohs
ntohl
htonl
SetupDiDeleteDeviceInterfaceData
CM_Get_Log_Conf_Priority_Ex
SetupCancelTemporarySourceList
SetupUninstallNewlyCopiedInfs
CM_Detect_Resource_Conflict
lstrlenA
lstrcpynA
WriteFile
WideCharToMultiByte
WaitForSingleObject
CloseHandle
CompareStringA
CreateEventA
CreateFileA
DeleteCriticalSection
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FindClose
FindFirstFileA
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetEnvironmentStringsA
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GetWriteWatch
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapFree
VirtualQuery
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFileTimeToFileTime
LocalFree
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
ResetEvent
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetNamedPipeHandleState
SetThreadLocale
SetThreadPriority
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
InitializeCriticalSection
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ImpersonateAnonymousToken
EnumThreadWindows
GetKeyboardType
LoadStringA
wsprintfA
CharNextA
CreateIconIndirect
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VarCmp
VarUI2FromDate
VariantChangeType
VariantClear
VariantCopy
VariantCopyInd
VariantInit
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElement
LPSAFEARRAY_Unmarshal
GetModuleDict
GetPointer
Mem_Realloc
Module_GetDict
ReInitThreads
State_Next
WriteObject
free_data
vSetTargetPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ