IgnoreErrors
List_SetSlice
Number_Und
SimpleParseFileFlags
StringAEncode
write_rows
Static task
static1
Behavioral task
behavioral1
Sample
7e946577250d96be2dd3dbf77974f0815cb612b463ea9a4c3929f37d403f5cc3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e946577250d96be2dd3dbf77974f0815cb612b463ea9a4c3929f37d403f5cc3.dll
Resource
win10v2004-20220812-en
Target
7e946577250d96be2dd3dbf77974f0815cb612b463ea9a4c3929f37d403f5cc3
Size
288KB
MD5
0a2b69447edbaf762a884a4444bfbbea
SHA1
176bcb14aa8e98e4630e61ce057318f7f4561c74
SHA256
7e946577250d96be2dd3dbf77974f0815cb612b463ea9a4c3929f37d403f5cc3
SHA512
2bb9021ed6509c8ce34bc278c09f2b8f78a2ef34505a4e6edfde0d9446fbc191dea199c6a482eeca0c48ff53b0842728a5936783fd6922d19c48cb9318e163c4
SSDEEP
6144:nmyBldF49Mpj0tjPtHCVSG4aNBCtKLe9PfpuOrZ9b:FBldFXVGEVoE8p9td
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetWindowPos
SetWindowRgn
ShowWindow
UnionRect
UnregisterClassA
EndPaint
DestroyWindow
DefWindowProcA
CreateWindowExA
BeginPaint
CharNextA
CallWindowProcA
SetWindowLongA
SetFocus
ReleaseDC
RegisterClassExA
PtInRect
OffsetRect
LoadCursorA
IsWindow
IsChild
InvalidateRect
IntersectRect
GetWindowLongA
GetParent
GetKeyState
GetFocus
GetDC
GetClientRect
GetClassInfoExA
EqualRect
CoTaskMemAlloc
CoTaskMemFree
CreateOleAdviseHolder
OleSaveToStream
WriteClassStm
CoCreateInstance
lstrlenW
lstrlenA
lstrcmpiA
WriteFile
WideCharToMultiByte
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FlushInstructionCache
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadResource
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
RtlUnwind
SetHandleCount
SetLastError
SizeofResource
Sleep
TerminateProcess
VariantChangeType
VariantInit
VariantClear
SysStringLen
SysStringByteLen
SysFreeString
SysAllocStringLen
SysAllocStringByteLen
SysAllocString
SafeArrayUnaccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
OleCreatePropertyFrame
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
GetDeviceCaps
DeleteMetaFile
DeleteDC
Rectangle
CreateMetaFileA
CreateCompatibleDC
CloseMetaFile
RestoreDC
SaveDC
SetTextAlign
SetWindowExtEx
SetWindowOrgEx
StretchBlt
TextOutA
CreateRectRgnIndirect
IgnoreErrors
List_SetSlice
Number_Und
SimpleParseFileFlags
StringAEncode
write_rows
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ