AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
Static task
static1
Behavioral task
behavioral1
Sample
fbc03cf00042ee0bfea3fdc818250207e5ff2a5de47552d7475e3a13afc9818f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fbc03cf00042ee0bfea3fdc818250207e5ff2a5de47552d7475e3a13afc9818f.dll
Resource
win10v2004-20220812-en
Target
fbc03cf00042ee0bfea3fdc818250207e5ff2a5de47552d7475e3a13afc9818f
Size
226KB
MD5
8868a9741c20523dde2b4018774f46e7
SHA1
4f62292cd47593fd45c60f04617d3e0a28913c0d
SHA256
fbc03cf00042ee0bfea3fdc818250207e5ff2a5de47552d7475e3a13afc9818f
SHA512
c3d30daca98b8b3bc40fc9728204b74aabf214b6e0e749f05bd41c84a2123e99f845e1555136602aeb873ace5f174d5aecf5533d36be08811830497c82a4775b
SSDEEP
6144:Ua3VtMt0LUoGmzlbpDTSL1dLJ8iEBHpvb/:JtMt0LhGalbpK5duVZb/
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
DeregisterEventSource
malloc
memcpy
memmove
memset
strrchr
towupper
wcschr
wcsrchr
wcsstr
wcstod
wcstol
wcstoul
wctomb
iswxdigit
iswspace
isleadbyte
free
_wtol
_write
_wcsupr
_wcsnicmp
_wcsicmp
_vsnwprintf
_unlock
_ultow
_stricmp
_snprintf
_purecall
_onexit
_lseeki64
_lock
_itoa
_isatty
_iob
_initterm
_fileno
_errno
_callnewh
_amsg_exit
__pioinfo
__dllonexit
__badioinfo
_XcptFilter
_CxxThrowException
CreateFileW
CreateSemaphoreA
CreateSemaphoreW
DebugBreak
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualProtect
VirtualAlloc
VerifyVersionInfoW
VerSetConditionMask
UnhandledExceptionFilter
TerminateProcess
Sleep
SetUnhandledExceptionFilter
SetStdHandle
SetLastError
SetConsoleTextAttribute
RtlUnwind
ReleaseSemaphore
ReadFile
QueryPerformanceCounter
OutputDebugStringA
MultiByteToWideChar
LocalReAlloc
LocalFree
LocalAlloc
LoadLibraryA
LeaveCriticalSection
InterlockedIncrement
InterlockedExchangeAdd
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
HeapWalk
HeapUnlock
HeapReAlloc
HeapLock
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalFree
GlobalAlloc
GetVersion
GetTickCount
GetSystemTimeAsFileTime
GetSystemInfo
GetStdHandle
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLocalTime
GetLastError
GetFileSize
GetEnvironmentVariableW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineA
GetACP
FormatMessageW
FormatMessageA
FlushFileBuffers
FindNextFileW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
ExitProcess
EnterCriticalSection
DisableThreadLibraryCalls
DeleteTimerQueueTimer
DeleteCriticalSection
CloseHandle
CoCreateInstance
CLSIDFromString
CoTaskMemFree
VariantClear
VariantInit
SysFreeString
SysAllocString
AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ