RuntimeWarning
WriteObjectToString
start_read_image
vResolveTokenVar
Static task
static1
Behavioral task
behavioral1
Sample
e49e80d8a673536c5b6f78681ff0cd35ee566a27bcde5d8a71e98870a0c0be51.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e49e80d8a673536c5b6f78681ff0cd35ee566a27bcde5d8a71e98870a0c0be51.dll
Resource
win10v2004-20220812-en
Target
e49e80d8a673536c5b6f78681ff0cd35ee566a27bcde5d8a71e98870a0c0be51
Size
557KB
MD5
053e45a9191be037bb30fdbd9c1a43d8
SHA1
f102aa4829f4ed391e5d8911e808fc2ea2d45bc4
SHA256
e49e80d8a673536c5b6f78681ff0cd35ee566a27bcde5d8a71e98870a0c0be51
SHA512
57403b63e314035104a1e796ff0b3caab0482857fbc15702177da90cd42cc11eacfccb0ca617ac144a120322e071c7305b15127035cbf402bea6db890d368748
SSDEEP
6144:gRieAYJuYDIy1ATSxRM8fTuzoiFIhR5PeGaDFPzdb1Z1967r05yKfUDb69i7FOLQ:gRieJJm4uSxyyjiIXsPzdbxUfsw2dAH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SaveDC
SetTextAlign
SetWindowExtEx
RestoreDC
StretchBlt
TextOutA
Rectangle
GetDeviceCaps
DeleteMetaFile
DeleteDC
CreateRectRgnIndirect
CreateMetaFileA
CreateCompatibleDC
SetWindowOrgEx
CloseMetaFile
PtInRect
OffsetRect
LoadCursorA
IsWindow
IsChild
RegisterClassExA
IntersectRect
GetWindowLongA
GetParent
GetKeyState
GetFocus
GetDC
ReleaseDC
SetFocus
SetWindowLongA
SetWindowPos
SetWindowRgn
ShowWindow
UnionRect
UnregisterClassA
EndPaint
DestroyWindow
DefWindowProcA
CreateWindowExA
CharNextA
CallWindowProcA
BeginPaint
InvalidateRect
GetClassInfoExA
EqualRect
GetClientRect
CoTaskMemFree
CreateOleAdviseHolder
OleSaveToStream
WriteClassStm
CoTaskMemAlloc
CoCreateInstance
HeapCreate
lstrlenW
lstrlenA
lstrcmpiA
WriteFile
WideCharToMultiByte
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
TerminateProcess
Sleep
SizeofResource
SetLastError
SetHandleCount
RtlUnwind
RaiseException
QueryPerformanceCounter
MultiByteToWideChar
MulDiv
LoadResource
LeaveCriticalSection
LCMapStringW
LCMapStringA
IsValidCodePage
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FlushInstructionCache
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
IsProcessorFeaturePresent
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
GetStartupInfoA
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByte
IsDebuggerPresent
VariantClear
VariantChangeType
SysStringLen
SysStringByteLen
SysFreeString
SysAllocStringLen
SysAllocStringByteLen
SysAllocString
SafeArrayUnaccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
RegisterTypeLi
OleCreatePropertyFrame
LoadTypeLi
LoadRegTypeLi
VariantInit
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCloseKey
RuntimeWarning
WriteObjectToString
start_read_image
vResolveTokenVar
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ