AfO899
CYvxX
DrawThemeIcon
LHWo914
TJqi910
XULm3
Static task
static1
Behavioral task
behavioral1
Sample
119.dll
Resource
win10-20220812-en
Target
18742 Dec 01.vhd
Size
80.0MB
MD5
f997ed3ef5bfa00bfd6407b83083f210
SHA1
6c2b807f32936292251462a9fec2d30f95c2d36f
SHA256
50df969f412391ca19609bbeeac268a4cf97ed8cc605fbfeddcb628373a637d9
SHA512
5eef91ba9f51a0f9c5905bc99de1b2804407fb5e0e7417184044b0b896c0ad4044eacfad25831d219145124276fd91203f2ea790300bf2a098392cd770aa1aba
SSDEEP
12288:qSUUEfo5I6/o2qgkpUdW9Msme0CWUdOWk4F:qSTiWDvLORme0C0Wk4
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateFileA
WriteFile
CloseHandle
HeapCreate
TryEnterCriticalSection
CreateThread
ResumeThread
GetModuleFileNameA
GetCurrentProcessId
SetEndOfFile
CreateFileMappingA
MapViewOfFile
CreateNamedPipeA
CallNamedPipeA
ConnectNamedPipe
FreeEnvironmentStringsW
DeleteCriticalSection
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
HeapAlloc
GetLastError
HeapFree
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
FreeLibrary
GetProcAddress
LoadLibraryExW
LCMapStringW
GetStdHandle
GetFileType
GetStartupInfoW
SetLastError
GetCurrentThreadId
GetProcessHeap
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetStdHandle
MultiByteToWideChar
GetCPInfo
WideCharToMultiByte
IsValidCodePage
GetACP
GetOEMCP
SetFilePointerEx
GetStringTypeW
ExitProcess
GetModuleHandleW
GetModuleHandleExW
ReadFile
ReadConsoleW
GetModuleFileNameW
CreateFileW
WriteConsoleW
DecodePointer
RaiseException
HeapSize
HeapReAlloc
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
InterlockedFlushSList
FindClose
FindFirstFileExW
FindNextFileW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
AfO899
CYvxX
DrawThemeIcon
LHWo914
TJqi910
XULm3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ