CheckSignals
RealAsDouble
SimpleString
vExecTokenA
Static task
static1
Behavioral task
behavioral1
Sample
a699ac09ddfd9ab4f59a375bf1b61af4e5dd1287e8a8104d3e88469e57db7bd0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a699ac09ddfd9ab4f59a375bf1b61af4e5dd1287e8a8104d3e88469e57db7bd0.dll
Resource
win10v2004-20220901-en
Target
a699ac09ddfd9ab4f59a375bf1b61af4e5dd1287e8a8104d3e88469e57db7bd0
Size
315KB
MD5
dc6bdcd1a9d023f653d542e65acfee66
SHA1
19a71d00cb2a10a2dc61870f99748e9db3bd96a6
SHA256
a699ac09ddfd9ab4f59a375bf1b61af4e5dd1287e8a8104d3e88469e57db7bd0
SHA512
06a32b2ccf8e7679984ff028047ba6e65d3785f035d1656116be459100a7e9d957a4dc43dc14dd316e8a9c9c3eba6a10129a0c06565078f63f87f3df74120af9
SSDEEP
6144:OvtH/QeKu+MtQrxzpSHIP7e9qgXAKy3sgT6WA6jDPIuzCPFUlc6:Od/RKuCr74IT0qLuA6WAQE9M
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHCreateDirectoryExW
PathAppendW
PathRemoveFileSpecW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
SetupGetStringFieldW
SetupFindNextLine
SetupFindFirstLineW
SetupDiSetDeviceInstallParamsW
SetupDiGetSelectedDriverW
SetupDiGetDeviceInstallParamsW
SetupCloseInfFile
WriteConsoleA
WriteConsoleW
WriteFile
GetLocalTime
WideCharToMultiByte
WaitForSingleObject
VirtualFree
VirtualAlloc
TerminateProcess
Sleep
SetStdHandle
SetLastError
SetHandleCount
CloseHandle
CreateFileA
CreateFileW
CreateMutexW
CreateProcessW
EnterCriticalSection
ExitProcess
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetExitCodeProcess
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersion
GetVersionExA
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
RtlUnwind
SetFilePointer
CheckSignals
RealAsDouble
SimpleString
vExecTokenA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ