KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
Static task
static1
Behavioral task
behavioral1
Sample
c02be0755d6824119b27a15398a8304376c9722125745f571c2f2bfbb4715fb2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c02be0755d6824119b27a15398a8304376c9722125745f571c2f2bfbb4715fb2.dll
Resource
win10v2004-20220812-en
Target
c02be0755d6824119b27a15398a8304376c9722125745f571c2f2bfbb4715fb2
Size
76KB
MD5
37a80446bf8d9f347d5ec42cdcf535e0
SHA1
e70963da2985b74b8749f46059aeddf4a225c98e
SHA256
c02be0755d6824119b27a15398a8304376c9722125745f571c2f2bfbb4715fb2
SHA512
6eaccc3d2f04dd5d88e8a36c52bc204cef839b6a21262bb5978e25a31ce45dbd1f7e207b272de43694a8685417314c4f2b320a465a88559def240456551c02bc
SSDEEP
768:I+qBY7hBdLOTf9US5EHcMnfKR0ToUU2wnqP3vjRi9VmRfpLiB9r59fZXIfzV4gkz:I+qBrTGKMnfKEo72RiS89xIW1o
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
VirtualQuery
VirtualProtect
GetLastError
WriteProcessMemory
GetCurrentProcess
lstrcmpiA
LoadLibraryA
GetProcAddress
LoadLibraryExA
LoadLibraryExW
ExitProcess
DisableThreadLibraryCalls
GetTickCount
VirtualAlloc
GetSystemTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
LoadLibraryW
GetModuleHandleA
RtlUnwind
GetTimeZoneInformation
GetLocalTime
GetCommandLineA
GetVersion
TerminateProcess
HeapReAlloc
HeapAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
RaiseException
GetWindowThreadProcessId
FindWindowExA
ImageDirectoryEntryToData
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ