ARawDecodeInit
GetExePath
HrIStreamWToBSTR
HrVerifyCertEnhKeyUsage
ReplaceChars
Static task
static1
Behavioral task
behavioral1
Sample
c12e4940136126c3c008013450a180d6b37b2265fdeea8243e5d8eda2999fca7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c12e4940136126c3c008013450a180d6b37b2265fdeea8243e5d8eda2999fca7.dll
Resource
win10v2004-20221111-en
Target
c12e4940136126c3c008013450a180d6b37b2265fdeea8243e5d8eda2999fca7
Size
173KB
MD5
f3ec8b61f7254291ca11daca3c494aff
SHA1
4a05628d82b8d07366dcd710d5b804988713f099
SHA256
c12e4940136126c3c008013450a180d6b37b2265fdeea8243e5d8eda2999fca7
SHA512
49f9738cdf817cf768c9aac7348a3325bcb6cc19f50e87e3d573fef84955d9b868fc23766fefd1f2d7ed9636b3f1326580286ba25870b320dd6697d6141fe718
SSDEEP
3072:7hD2Bc98gRZHybUARkgXCtkMj7ZV/8HCc49GImwG1eNAwcxtH:j98gRZHybUgd7MnZV/8O9GImReFm
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
wprintf
wcsstr
printf
memset
free
exit
_wcslwr
_wcsdup
_ismbblead
_initterm
_exit
_controlfp
_cexit
_amsg_exit
__setusermatherr
__set_app_type
__p__fmode
__p__commode
__getmainargs
_XcptFilter
SHCreateDirectoryExW
SHGetSpecialFolderLocation
CommandLineToArgvW
IsWindow
MessageBoxW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
VirtualAlloc
UnhandledExceptionFilter
TerminateProcess
Sleep
SetUnhandledExceptionFilter
InterlockedExchange
VirtualFree
GetModuleHandleA
GetFullPathNameW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineW
FindNextFileW
ExitProcess
VirtualProtect
lstrlenW
GetProcAddress
FindFirstFileW
ArcTo
PolyDraw
ARawDecodeInit
GetExePath
HrIStreamWToBSTR
HrVerifyCertEnhKeyUsage
ReplaceChars
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ