AsString
Long_FromVoidPtr
Number_Und
data_freer
get_sPLT
set_crc_action
write_row
Static task
static1
Behavioral task
behavioral1
Sample
720c0abdca2994f11e7cb78e0eddfd9730eef2e4ea79c9a4341caf0c3dc88b5c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
720c0abdca2994f11e7cb78e0eddfd9730eef2e4ea79c9a4341caf0c3dc88b5c.dll
Resource
win10v2004-20221111-en
Target
720c0abdca2994f11e7cb78e0eddfd9730eef2e4ea79c9a4341caf0c3dc88b5c
Size
472KB
MD5
3f7a983c0d8648b3f50051c59426c780
SHA1
f70d3f9086715040daf4f3a7fa54d98c11486eb3
SHA256
720c0abdca2994f11e7cb78e0eddfd9730eef2e4ea79c9a4341caf0c3dc88b5c
SHA512
e327b9dcce20aaf4d692ae06c49854670cb7038335106750ded1a36160996d1cdba5a2ae3e46eccf56ec52f4f93b271133bf462ee2dd0d00521af616436b656f
SSDEEP
12288:gywAJN0/7w6PwiBf8BQvkoFm0jbJOfhZks:gywA1liBf8BQvnM0nJOJZD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetClassWord
RegisterWindowMessageA
InterlockedDecrement
lstrcpyA
WriteFile
DisableThreadLibraryCalls
EnterCriticalSection
FreeEnvironmentStringsA
GetACP
GetCommandLineA
GetEnvironmentVariableA
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
GetStartupInfoA
GetStringTypeA
GetTickCount
GetVersion
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
WideCharToMultiByte
InterlockedIncrement
LCMapStringA
LCMapStringW
LeaveCriticalSection
MultiByteToWideChar
RtlUnwind
SetHandleCount
SetLastError
TerminateProcess
VirtualAlloc
VirtualFree
MiniDumpReadDumpStream
SearchTreeForFile
SymEnumTypes
SymInitialize
FindExecutableImageEx
AsString
Long_FromVoidPtr
Number_Und
data_freer
get_sPLT
set_crc_action
write_row
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ