FlagsFilenameEx
Values
_Pop
get_pHYs
get_rowbytes
level
memset_check
reset_zstream
Static task
static1
Behavioral task
behavioral1
Sample
f1fbea4261b7c76fd3c2ef58ff8d0c4f2996a3d365b49b063d1127d66a783c82.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f1fbea4261b7c76fd3c2ef58ff8d0c4f2996a3d365b49b063d1127d66a783c82.dll
Resource
win10v2004-20220812-en
Target
f1fbea4261b7c76fd3c2ef58ff8d0c4f2996a3d365b49b063d1127d66a783c82
Size
578KB
MD5
a17f650e5985c125110080586801eca8
SHA1
4f722161215d41663910d331c66353d74ab8bef1
SHA256
f1fbea4261b7c76fd3c2ef58ff8d0c4f2996a3d365b49b063d1127d66a783c82
SHA512
32dfe24bf87be0fdfec4cf36d0530a3031abb81bc5b4e21c6f27d2d4858319c89604bfee56c1be29e0ef4e3693c70f4df233b8275edabc25aded3f8bf6904f91
SSDEEP
12288:Gyl/DcnTDrSmpI4ee2PFMyfG4/p9gHV7rf/uLVArhLUThoR46:GymTaKI4eeAfGkngHV7rf/uLVCmCq6
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StringFromGUID2
CreateDataAdviseHolder
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoCreateInstance
UnhookWindowsHookEx
ShowWindow
SetWindowsHookExA
SetFocus
RegisterClipboardFormatA
MoveWindow
IsZoomed
IsWindowVisible
IsIconic
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
GetForegroundWindow
EnumDisplaySettingsA
DestroyWindow
CreateDialogParamA
CharNextW
CharNextA
CallNextHookEx
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
lstrlenW
lstrlenA
lstrcmpiA
WriteFile
WideCharToMultiByte
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
IsValidCodePage
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
TerminateProcess
Sleep
SizeofResource
SetUnhandledExceptionFilter
SetLastError
SetHandleCount
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadResource
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
UnhandledExceptionFilter
GetProcessHeap
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
IsDebuggerPresent
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
RtlUnwind
LoadTypeLi
RegisterTypeLi
SysAllocString
SysFreeString
SysStringLen
UnRegisterTypeLi
VarUI4FromStr
VariantClear
FlagsFilenameEx
Values
_Pop
get_pHYs
get_rowbytes
level
memset_check
reset_zstream
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ