GetGlobals
InPlaceAdd
Instance_NewRaw
ReadLongFromFile
RichCompareBool
_Clear
set_sRGB
set_sig_bytes
Static task
static1
Behavioral task
behavioral1
Sample
d9f79b4c8ae3a24e7c18bce0c2fe8ec47f33d3053499404cf9e5a671e0befcf5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9f79b4c8ae3a24e7c18bce0c2fe8ec47f33d3053499404cf9e5a671e0befcf5.dll
Resource
win10v2004-20221111-en
Target
d9f79b4c8ae3a24e7c18bce0c2fe8ec47f33d3053499404cf9e5a671e0befcf5
Size
650KB
MD5
7fa6b3c5b71e5026cec425042ff58747
SHA1
bb6e024b63967d42e31a277e54619bf40e938855
SHA256
d9f79b4c8ae3a24e7c18bce0c2fe8ec47f33d3053499404cf9e5a671e0befcf5
SHA512
420b692d78b241db97c73c6ed529aeeb617244a99ce6f53b3041a68d0577a56c3bc3e9896e9bf5d99c55ee437ec21efa7800a9fc063322ff4ca78f99dc9e9e17
SSDEEP
12288:zka/tl/now+HKctzCnzxf0XkZmuy09QMVjthrI7Sk:r/3nowiKJnzxfnyyjS7R
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindFirstFileA
FreeEnvironmentStringsA
FreeLibrary
FreeResource
FreeUserPhysicalPages
GetACP
GetCPInfo
GetCommandLineA
GetConsoleDisplayMode
GetCurrentConsoleFont
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetHandleInformation
GetLastError
GetLocaleInfoA
GetLogicalDrives
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessIoCounters
GetProcessPriorityBoost
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTimeAsFileTime
GetTapePosition
GetTapeStatus
GetThreadLocale
GetThreadPriority
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalDeleteAtom
GlobalFix
GlobalFree
GlobalHandle
GlobalLock
CreateEventA
GlobalReAlloc
GlobalUnlock
Heap32ListNext
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadModule
LocalAlloc
LocalFileTimeToFileTime
LocalReAlloc
Module32FirstW
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
ResumeThread
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetLastError
SetProcessAffinityMask
SetThreadExecutionState
SetThreadLocale
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
_lopen
lstrcpynA
CreateConsoleScreenBuffer
ConvertDefaultLocale
CloseHandle
GlobalMemoryStatus
AllocConsole
RegCloseKey
CreateTraceInstanceId
AreAllAccessesGranted
RegOpenKeyExA
GetKeyboardType
LoadStringA
keybd_event
EnumThreadWindows
wsprintfA
GetKeyboardLayout
VarR4FromI2
VariantInit
VariantCopyInd
VariantChangeType
VarI1FromDate
VarCyFromUI4
LPSAFEARRAY_Unmarshal
SafeArrayGetElement
SafeArrayGetLBound
SysFreeString
SysReAllocStringLen
VarBoolFromR4
VarCmp
CM_Get_Sibling
SetupUninstallNewlyCopiedInfs
SetupOpenLog
SetupDiInstallDevice
SetupDiDeleteDeviceInterfaceData
SetupCloseInfFile
htonl
ntohl
socket
WSACancelAsyncRequest
GetGlobals
InPlaceAdd
Instance_NewRaw
ReadLongFromFile
RichCompareBool
_Clear
set_sRGB
set_sig_bytes
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ