GetFileInItemCount
GetFunctions
GetSymbolAddress
HostGetFlags
Static task
static1
Behavioral task
behavioral1
Sample
bb1fa4d4f0d72920b45d4b92da3fa1c2080ff7af7a24f18c9d08466d5d966a79.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb1fa4d4f0d72920b45d4b92da3fa1c2080ff7af7a24f18c9d08466d5d966a79.dll
Resource
win10v2004-20220812-en
Target
bb1fa4d4f0d72920b45d4b92da3fa1c2080ff7af7a24f18c9d08466d5d966a79
Size
359KB
MD5
44d83e25d063c768e883df5416b0a18d
SHA1
21a38a71888c9b16e2ff53672162a9c096048839
SHA256
bb1fa4d4f0d72920b45d4b92da3fa1c2080ff7af7a24f18c9d08466d5d966a79
SHA512
cb0b9731062175c38fc6e4461b6eb8621474230e7f41c6c3316e0d9b794c37ff33febcdc180422d45389a709d4b90844e3f6e737db334fbd3a7876d3aad8704e
SSDEEP
6144:RvFnq3P78cHyWaeSGaQGy8zMnxpWWmDLzsLxpBI9J:dk3PRhSGI7zcxSYlpB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetFolderPathA
FindFirstFileA
FindNextFileA
FindClose
RemoveDirectoryA
GetSystemDefaultLangID
GetFileSize
DeleteFileA
GetVersion
lstrcatA
GetLastError
SetFileAttributesA
CreateDirectoryA
GetFileAttributesA
lstrlenA
MultiByteToWideChar
GetUserDefaultLangID
GetLocaleInfoA
GetModuleFileNameA
LoadLibraryA
LockResource
LoadResource
FindResourceA
FreeLibrary
GetProcAddress
GetCurrentProcess
LocalFree
LocalAlloc
GetVersionExA
IsBadWritePtr
GetCurrentThread
CloseHandle
ReadFile
CreateFileA
SetCurrentDirectoryA
GetCurrentDirectoryA
LocalFileTimeToFileTime
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetTickCount
GetModuleHandleA
GlobalMemoryStatus
Sleep
lstrlenW
WaitForSingleObject
CreateEventA
DeviceIoControl
EnterCriticalSection
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
RaiseException
GetCommandLineA
GetDriveTypeA
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
ExitProcess
FatalAppExitA
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
TerminateProcess
HeapSize
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
GetFullPathNameA
VirtualAlloc
GetStringTypeA
GetStringTypeW
SetFilePointer
FlushFileBuffers
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
GetUserDefaultLCID
IsBadReadPtr
IsBadCodePtr
UnhandledExceptionFilter
SetStdHandle
SetConsoleCtrlHandler
SetEndOfFile
GetLocaleInfoW
SetEnvironmentVariableA
FormatMessageA
RtlUnwind
MessageBoxA
LoadStringA
SysAllocString
SysAllocStringLen
SysFreeString
AllocateAndInitializeSid
SetEntriesInAclA
RegEnumKeyExA
RegEnumValueA
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
AddAccessAllowedAce
InitializeAcl
GetLengthSid
OpenProcessToken
OpenThreadToken
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
ImpersonateSelf
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegDeleteValueA
CoCreateInstance
CoInitialize
CoUninitialize
CoInitializeEx
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
SHDeleteKeyA
GetFileInItemCount
GetFunctions
GetSymbolAddress
HostGetFlags
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ