AllocADsMem
GetNextPageS
QuaternionLn
SchemaIsClassAContainer
XSet
Static task
static1
Behavioral task
behavioral1
Sample
ee6ff723c8402e5e85aab6d84cb5401949ba7ec3fd6d493930ecef4dda0e020d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ee6ff723c8402e5e85aab6d84cb5401949ba7ec3fd6d493930ecef4dda0e020d.dll
Resource
win10v2004-20221111-en
Target
ee6ff723c8402e5e85aab6d84cb5401949ba7ec3fd6d493930ecef4dda0e020d
Size
389KB
MD5
f418f592bec92d6c314bf1b4809b307e
SHA1
9660df31f4dd533cc158f72a5c6b880308587a84
SHA256
ee6ff723c8402e5e85aab6d84cb5401949ba7ec3fd6d493930ecef4dda0e020d
SHA512
d66d7dac8bf19342eea547583c06d9755c75b549a66eb5b7714b8b2726be7e7fd717acca7501a1e3ae64d2ecfd9df2c5c4689644cc8b48aa7a0a211386c4e10a
SSDEEP
6144:uDjnMwzxK7z7qz6RljL2ojy/o+4lC40lYEMHpgw2HelR3OzG2DyGKga0mcY59:Cn9ximz63jIo+4440GEMJgwuwmGSaPc
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
ImpersonateAnonymousToken
CoTaskMemFree
StringFromCLSID
lstrlenW
WideCharToMultiByte
WaitForSingleObject
CloseHandle
CreateFileA
CreateProcessA
DeleteCriticalSection
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
FreeLibrary
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetLastError
GetLocaleInfoA
GetLongPathNameA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
GetShortPathNameA
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersionExA
GlobalUnWire
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
LoadLibraryA
QueryInformationJobObject
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualAlloc
AllocADsMem
GetNextPageS
QuaternionLn
SchemaIsClassAContainer
XSet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ