Free
FromReadWriteObject
List_New
Mem_Realloc
Static task
static1
Behavioral task
behavioral1
Sample
c81eb789fbb7fbe7cd41a8642b616d0e33b256b631f19c1208d9db5ac3516c8e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c81eb789fbb7fbe7cd41a8642b616d0e33b256b631f19c1208d9db5ac3516c8e.dll
Resource
win10v2004-20220901-en
Target
c81eb789fbb7fbe7cd41a8642b616d0e33b256b631f19c1208d9db5ac3516c8e
Size
381KB
MD5
a41826fd865b2c31b8a67b2469c1f870
SHA1
30bc98b1c7c36aa2349f1bd764a970c4bfba4791
SHA256
c81eb789fbb7fbe7cd41a8642b616d0e33b256b631f19c1208d9db5ac3516c8e
SHA512
f2f530e24d96d88ec77562764db1841ee7f7aaee49741110ed68db05de6dcd8c27d5b3b9106dcc93c0d2e48cb9bddb25b6e9ebb34a2b8b0efbfc8dfdc60a224a
SSDEEP
6144:+o6Yx3uOXG5kegjRvC2YWFdPUKd97kM8//WxESZr45vLtjBirJqJ9sgBJ0Qi:t6Yx36gjdC2BFdP9d9U/+yZBitqJ9sgE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord17
DirectInputCreateA
GetModuleFileNameW
GetModuleHandleA
GetNamedPipeInfo
GetProcAddress
GetProcessPriorityBoost
GetProcessVersion
GetStartupInfoA
GetStdHandle
GetSystemPowerStatus
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultLCID
GetUserDefaultLangID
GetVersionExA
GlobalAddAtomW
GlobalAlloc
GlobalFindAtomW
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCompact
HeapFree
HeapReAlloc
HeapValidate
InitializeCriticalSection
InterlockedIncrement
IsBadReadPtr
GetMailslotInfo
LoadResource
LocalAlloc
LocalFree
Module32Next
MultiByteToWideChar
OpenProcess
Process32FirstW
Process32NextW
QueryPerformanceCounter
RaiseException
ReadDirectoryChangesW
RtlZeroMemory
SetErrorMode
SetEvent
SetFilePointer
TerminateJobObject
Thread32Next
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualQueryEx
VirtualUnlock
WideCharToMultiByte
WriteFile
WriteFileEx
_lread
lstrcatW
lstrcpynW
lstrlenW
GetLastError
GetFileAttributesW
GetExitCodeThread
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStringsA
GetDevicePowerState
GetCurrentThreadId
GetCurrentProcessId
GetCurrentConsoleFont
GetConsoleWindow
GetCommandLineA
GetCPInfo
GetACP
FreeEnvironmentStringsA
FlushConsoleInputBuffer
EnterCriticalSection
CreateToolhelp32Snapshot
CreateConsoleScreenBuffer
ConnectNamedPipe
BindIoCompletionCallback
BackupRead
AllocateUserPhysicalPages
AllocConsole
LoadLibraryA
DocumentPropertiesW
OpenPrinterW
ClosePrinter
SetRectRgn
SetMapperFlags
SetMapMode
SelectObject
SelectBrushLocal
ScaleWindowExtEx
ScaleViewportExtEx
RestoreDC
PolyBezierTo
OffsetViewportOrgEx
GetStockObject
GetDeviceCaps
GetBkColor
ExcludeClipRect
DeleteDC
CreateSolidBrush
CreateHatchBrush
ColorCorrectPalette
CloseMetaFile
AnimatePalette
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetSystemPaletteUse
GetMenuItemCount
WaitMessage
UnregisterClassW
UnhookWindowsHookEx
AdjustWindowRectEx
CallWindowProcW
CheckMenuItem
ClientToScreen
CloseDesktop
CopyRect
CreatePopupMenu
DispatchMessageW
DrawIconEx
DrawTextW
EnableMenuItem
EnableWindow
EndDeferWindowPos
ExcludeUpdateRgn
FrameRect
GetCapture
GetCaretPos
GetClassInfoW
GetDC
GetDlgItem
GetKeyState
GetKeyboardLayoutList
GetLastActivePopup
GetMenu
GetMenuCheckMarkDimensions
GetMenuState
GetNextDlgTabItem
GetSubMenu
GetSysColorBrush
GetTopWindow
GetWindowLongW
GetWindowRect
GetWindowTextW
IsIconic
LoadCursorW
LookupIconIdFromDirectory
PeekMessageW
PostMessageW
ReleaseCapture
ReleaseDC
ScrollWindowEx
SendMessageW
SetFocus
SetPropW
SetRect
SetWindowLongW
ShowWindow
TabbedTextOutW
ToAscii
Free
FromReadWriteObject
List_New
Mem_Realloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ