ADeviceStartPlay
DeleteTempFile
FMissingCert
OpenFileStreamWithFlagsW
PVDecodeObject
PszSkipWhiteA
Static task
static1
Behavioral task
behavioral1
Sample
b66ca99e63f5001cf30443fe6f899e769193863029f7259062ddf7b08bfba6eb.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b66ca99e63f5001cf30443fe6f899e769193863029f7259062ddf7b08bfba6eb.dll
Resource
win10v2004-20221111-en
Target
b66ca99e63f5001cf30443fe6f899e769193863029f7259062ddf7b08bfba6eb
Size
166KB
MD5
689197c896b5deaabd8d8e7b8d5381a2
SHA1
e1584f1433742611a77edcbfc59ab2e731d10e9f
SHA256
b66ca99e63f5001cf30443fe6f899e769193863029f7259062ddf7b08bfba6eb
SHA512
f4b959fedfd59f54baa09b214d98392d8a15c6b862b0f06cbf4f60024bf6b2f1d2646638ae5ca8c7b2b12fc9dc70bbc59ee48ea640e325daf8b50e0c4e034ca4
SSDEEP
3072:qV0ukZ67MNq2moImOTkr3Bis+Eorr0ixUmhHyQb2q8yAfk5Gceca:wqkmP7oP005yQLl51
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CancelIo
CloseHandle
CreateEventA
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessAffinityMask
GetThreadContext
GetThreadPriority
InterlockedDecrement
InterlockedExchangeAdd
LoadLibraryA
OpenProcess
QueryInformationJobObject
ReleaseSemaphore
ResetEvent
ResumeThread
SetEvent
SetLastError
SetThreadContext
SetThreadPriority
Sleep
SuspendThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualProtect
WaitForMultipleObjects
WaitForSingleObject
SHGetFolderPathW
SHFormatDrive
WSASetLastError
WSAGetLastError
__dllonexit
_adjust_fdiv
_beginthreadex
_endthreadex
_errno
_ftime
_initterm
_onexit
_setjmp3
_wcreat
calloc
exit
free
longjmp
malloc
ADeviceStartPlay
DeleteTempFile
FMissingCert
OpenFileStreamWithFlagsW
PVDecodeObject
PszSkipWhiteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ