FBuildTempPathW
GetChecksum
PszAllocW
ReadSpan
Static task
static1
Behavioral task
behavioral1
Sample
aa9167c36550cdf185b4ea281ec937bc0722768fc1bb5d30804abfd57022044f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa9167c36550cdf185b4ea281ec937bc0722768fc1bb5d30804abfd57022044f.dll
Resource
win10v2004-20221111-en
Target
aa9167c36550cdf185b4ea281ec937bc0722768fc1bb5d30804abfd57022044f
Size
156KB
MD5
5cc5d91d29ad2a3dcd861e11e36fd4a6
SHA1
29b1be3f3ea59cefac5aa640906bbf555e00714c
SHA256
aa9167c36550cdf185b4ea281ec937bc0722768fc1bb5d30804abfd57022044f
SHA512
46456ea77f85417db982ead8cd5f9b3f019cbbf5d64fc2c4dcfbb7a3f2b83cd13c67cf96b85ecce356d54b5d995a4844d7a5ee425da1de911681b8034871c7a2
SSDEEP
3072:VJvjS8J43gSEL16a8/rsy1mP7pJN9wEPobatJd2JUpn1h:7vuwB8/rjmP7V1Fpn
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentStringsW
GetEnvironmentVariableA
GetExitCodeProcess
GetFileType
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryA
GetTempPathA
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
GetCommandLineA
InterlockedIncrement
IsBadCodePtr
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
OpenProcess
RaiseException
RtlUnwind
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpA
lstrlenA
lstrlenW
GetCPInfo
GetACP
FreeResource
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FlushInstructionCache
CloseHandle
FlushFileBuffers
FindResourceA
FindFirstFileA
FindClose
ExitProcess
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateProcessA
CreateFileA
CreateDirectoryA
InterlockedDecrement
IsDialogMessageA
IsWindow
LoadCursorA
LoadImageA
MoveWindow
PeekMessageA
PostQuitMessage
RedrawWindow
RegisterClassExA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
SendMessageA
SetCapture
SetFocus
SetWindowLongA
SetWindowPos
SetWindowTextA
SetWindowsHookExA
ShowWindow
SystemParametersInfoA
IsChild
UnhookWindowsHookEx
wsprintfA
GetMessageA
GetFocus
GetDlgItem
GetDesktopWindow
GetDC
GetCursor
GetClientRect
GetClassNameA
GetClassInfoExA
FillRect
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
CreateDialogIndirectParamA
CreateAcceleratorTableA
CallWindowProcA
CallNextHookEx
InvalidateRect
InvalidateRgn
BeginPaint
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetWindowLongA
GetWindow
GetSystemMetrics
GetSysColor
TranslateMessage
GetParent
DestroyWindow
GetStockObject
GetObjectA
SelectObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
PatBlt
BitBlt
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
ShellExecuteA
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoCreateInstance
CLSIDFromString
CreateStreamOnHGlobal
OleInitialize
OleLockRunning
StringFromCLSID
CoInitialize
CLSIDFromProgID
OleUninitialize
DispCallFunc
OleCreateFontIndirect
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VariantClear
LoadRegTypeLi
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
InternetGetConnectedState
ord17
FBuildTempPathW
GetChecksum
PszAllocW
ReadSpan
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ