ADoTest
CleanupGlobalTempFiles
CreateContext
GetCursorInfo
Unlock
Static task
static1
Behavioral task
behavioral1
Sample
af4726a313ad57e1641248bc097eb656d5a4de1446a6486bc15dd57f060b3efb.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
af4726a313ad57e1641248bc097eb656d5a4de1446a6486bc15dd57f060b3efb.dll
Resource
win10v2004-20220812-en
Target
af4726a313ad57e1641248bc097eb656d5a4de1446a6486bc15dd57f060b3efb
Size
164KB
MD5
9756ae74902e498f335e8b08b2552949
SHA1
1b58508d39e2cabaff830f605c5680fb1bd9537c
SHA256
af4726a313ad57e1641248bc097eb656d5a4de1446a6486bc15dd57f060b3efb
SHA512
1f479b41a5b2cbe2efd2db288e63889c1ef68a91c855cfe4ec3a23365615a641ce47e6f472320b19733549eed6643390e052e24728cb0e299d3f2012d14b21b1
SSDEEP
3072:chLXJpt4omqAWQbuOObdsmzF70YMo/GYsyT3FBA0iv8F3j9eHJgxWjI0:ch7Jr45qcORRp/GVc1OUF3j98cC
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateEventA
CreateSemaphoreA
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExitProcess
FlushInstructionCache
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessAffinityMask
GetProcessHeaps
GetThreadContext
GetThreadPriority
GlobalFlags
InitializeCriticalSection
InterlockedDecrement
InterlockedExchangeAdd
IsBadWritePtr
LoadLibraryA
OpenProcess
QueueUserAPC
ReleaseSemaphore
ResetEvent
ResumeThread
SetEvent
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SuspendThread
SwitchToFiber
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnregisterWait
VirtualAlloc
VirtualFree
VirtualProtect
WaitForMultipleObjects
WaitForSingleObject
SHGetDiskFreeSpaceExA
SHGetFolderPathW
ShellHookProc
RegenerateUserEnvironment
_errno
_ftime
_endthreadex
_onexit
_setjmp3
calloc
exit
longjmp
tmpnam
_adjust_fdiv
__dllonexit
_initterm
WSASetLastError
WSAGetLastError
ADoTest
CleanupGlobalTempFiles
CreateContext
GetCursorInfo
Unlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ