HostGetFlags
Malloc
Static task
static1
Behavioral task
behavioral1
Sample
f106cc0d49d3407bac0b13c47391264c47e81ef09f64fa696e4d77b71abdac2c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f106cc0d49d3407bac0b13c47391264c47e81ef09f64fa696e4d77b71abdac2c.dll
Resource
win10v2004-20220812-en
Target
f106cc0d49d3407bac0b13c47391264c47e81ef09f64fa696e4d77b71abdac2c
Size
183KB
MD5
3e1cb1a035492674c37abc4af7a98ee9
SHA1
00a18bff15b90b3d8d6d596118b80011aba2bff6
SHA256
f106cc0d49d3407bac0b13c47391264c47e81ef09f64fa696e4d77b71abdac2c
SHA512
1f9312ec4db3fb96151f04a3dcc6ecb23a919d8ba1869aa7770323874f99ae9b0ce9b66c4fe860b1504e7373d952c187a0f30327dae824bafdd478f224bb7119
SSDEEP
3072:1bSXp8haDgeheJtRRV168vbsgP3j5/uE0I8du497P5D/lJ7mDGc11ghdtWWGPKf:1WmhaKJRn6ggsWEA1LD77BjhGWz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateFileMappingA
DeviceIoControl
EnterCriticalSection
ExitProcess
FreeEnvironmentStringsW
GetACP
GetCommandLineA
GetCurrentThreadId
GetDriveTypeA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStartupInfoA
GetTimeZoneInformation
GetVersionExA
GlobalLock
HeapAlloc
HeapCreate
HeapReAlloc
LCMapStringA
LoadLibraryA
LocalAlloc
MapViewOfFile
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
RtlUnwind
SetHandleCount
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
lstrcmpA
IsWindowVisible
EndDialog
DrawIconEx
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
StringFromGUID2
RegEnumKeyExW
GetServiceKeyNameW
HostGetFlags
Malloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ