AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
Static task
static1
Behavioral task
behavioral1
Sample
de94b7d1637b8e1e105a60c944d3b346de8fa64f298df5751d4356ae25992d29.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de94b7d1637b8e1e105a60c944d3b346de8fa64f298df5751d4356ae25992d29.dll
Resource
win10v2004-20221111-en
Target
de94b7d1637b8e1e105a60c944d3b346de8fa64f298df5751d4356ae25992d29
Size
228KB
MD5
53ad87299f93c43c2f6736537be63b10
SHA1
13703fbc0f88955aca047730d0ffc456907792af
SHA256
de94b7d1637b8e1e105a60c944d3b346de8fa64f298df5751d4356ae25992d29
SHA512
ec235242b2ec3c143e5d71a44f129d42676d4c644119589efbb287b847b029146564fc4a2c6f050d544c34e61a94f2ad0ed3046df277fe7c290b1be81b31e62a
SSDEEP
3072:DOKEDOvvxxOz7kIC1uJhL1kNMpniRInH2QpfhihKNe++a5KsAvx1htMNV8D/Kww7:DOKiOxQoI954OniyJpfhNABawLb+3Qi
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
DeleteTimerQueueTimer
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FormatMessageA
FormatMessageW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableW
GetFileSize
GetLastError
GetLocalTime
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersion
GlobalAlloc
GlobalFree
HeapAlloc
HeapCreate
DebugBreak
HeapFree
HeapLock
HeapReAlloc
HeapUnlock
HeapWalk
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
LocalReAlloc
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
RtlUnwind
SetConsoleTextAttribute
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateSemaphoreW
CreateSemaphoreA
CreateFileW
HeapDestroy
CloseHandle
RegOpenKeyExA
RegCloseKey
DeregisterEventSource
RegQueryValueExA
SysAllocString
VarBstrFromCy
VarCyFromI2
VarI4FromI1
VarUI2FromUI4
VariantInit
CoGetCallContext
CoInitializeEx
CoTaskMemFree
StgCreatePropStg
CLSIDFromString
AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ