ARawDecodeInit
GetExePath
HrIStreamWToBSTR
HrVerifyCertEnhKeyUsage
ReplaceChars
Static task
static1
Behavioral task
behavioral1
Sample
8c43ea783129018332a5e706bca8080c11418fd9559c26fa30ec435120fb40cf.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c43ea783129018332a5e706bca8080c11418fd9559c26fa30ec435120fb40cf.dll
Resource
win10v2004-20220812-en
Target
8c43ea783129018332a5e706bca8080c11418fd9559c26fa30ec435120fb40cf
Size
164KB
MD5
f5e516b7a87fc94e3297fef9c45aebde
SHA1
1c4536ea4b0d7190c9c47b477f17917d46e78519
SHA256
8c43ea783129018332a5e706bca8080c11418fd9559c26fa30ec435120fb40cf
SHA512
9b3e88739bd7a86eb8a30a847774b407ae8bf71b3d41971403eab6f2dcb44d3ac6eb000f6eafc98366980ae7899b6f74ef3d0638ed54f86e3583dd25a499b23d
SSDEEP
3072:F3PSiBG710edThJjmxfHU3fUes6cGJDLfB+hcaTf5ScYFl+NREdL:J6iYtmxc3f1J/+hpi+
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
wprintf
wcsstr
printf
memset
free
exit
_wcslwr
_wcsdup
_ismbblead
_initterm
_exit
_controlfp
_cexit
_amsg_exit
__setusermatherr
__set_app_type
__p__fmode
__p__commode
__getmainargs
_XcptFilter
SHCreateDirectoryExW
SHGetSpecialFolderLocation
CommandLineToArgvW
IsWindow
MessageBoxW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
VirtualAlloc
UnhandledExceptionFilter
TerminateProcess
Sleep
SetUnhandledExceptionFilter
InterlockedExchange
VirtualFree
GetModuleHandleA
GetFullPathNameW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineW
FindNextFileW
ExitProcess
VirtualProtect
lstrlenW
GetProcAddress
FindFirstFileW
ArcTo
PolyDraw
ARawDecodeInit
GetExePath
HrIStreamWToBSTR
HrVerifyCertEnhKeyUsage
ReplaceChars
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ