AddStateStruct
Clear
CrackNotificationPackage
CreateDatabase
CryptAllocFunc
DeleteTempFile
GetCurrentIndex
GetObjidFromName
GetQueryParameterInfo
HrFindInetTimeZone
HrTtreamSeekEnd
IsValidFileIfFileUrl
PrepareUpdate
PszAllocW
Static task
static1
Behavioral task
behavioral1
Sample
23da48b9f291d4d6e06cf0c2e7fde058315601b34a038347f25b4e310ff84c51.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23da48b9f291d4d6e06cf0c2e7fde058315601b34a038347f25b4e310ff84c51.dll
Resource
win10v2004-20220901-en
Target
23da48b9f291d4d6e06cf0c2e7fde058315601b34a038347f25b4e310ff84c51
Size
174KB
MD5
1784447d9f7a3ffe6610bbd5b3d9b045
SHA1
70bc9b16ceb72bb9b0334dd87c8df078da56c67b
SHA256
23da48b9f291d4d6e06cf0c2e7fde058315601b34a038347f25b4e310ff84c51
SHA512
ffc2742e9115242d603b446473506ca5ca9e0399575b4c3448aa3c80183add51724d132fb26c8b6d4190397e081c7c250941d2459b4c3eb2cd299a1dffb746b3
SSDEEP
3072:BBN1OtPAVQ+x78VfOxKw93oEeiaLf2NCPu1K4j7wzh1wcwAGFDMX21fD:BJOtPGQWfZ3o3iaLuYm5jfcZsV
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
wprintf
wcsstr
printf
memset
free
exit
_wcslwr
_wcsdup
_ismbblead
_initterm
_exit
_controlfp
_cexit
_amsg_exit
__setusermatherr
__set_app_type
__p__fmode
__p__commode
__getmainargs
_XcptFilter
PolyDraw
ArcTo
IsWindow
SHGetSpecialFolderLocation
SHCreateDirectoryExW
CommandLineToArgvW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
Sleep
SetUnhandledExceptionFilter
InterlockedExchange
GetProcAddress
TerminateProcess
GetCurrentProcessId
FindNextFileW
FindFirstFileW
ExitProcess
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
lstrlenW
GetModuleHandleA
AddStateStruct
Clear
CrackNotificationPackage
CreateDatabase
CryptAllocFunc
DeleteTempFile
GetCurrentIndex
GetObjidFromName
GetQueryParameterInfo
HrFindInetTimeZone
HrTtreamSeekEnd
IsValidFileIfFileUrl
PrepareUpdate
PszAllocW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ