ExecCodeModuleEx
FromNode
TypeError
chunk_error
Static task
static1
Behavioral task
behavioral1
Sample
df5c5742b4dddd6b1052876b18c7b2b0136c801e3a070e1300b6b2bf839d8813.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
df5c5742b4dddd6b1052876b18c7b2b0136c801e3a070e1300b6b2bf839d8813.dll
Resource
win10v2004-20230220-en
Target
df5c5742b4dddd6b1052876b18c7b2b0136c801e3a070e1300b6b2bf839d8813
Size
675KB
MD5
4c0ed8b0f1c54e9827208ade1f55d633
SHA1
1168fe1079246490552119f506b9792f2144bb4a
SHA256
df5c5742b4dddd6b1052876b18c7b2b0136c801e3a070e1300b6b2bf839d8813
SHA512
99fff0137f0ca75a77f366d96c75be979bcb30324a3ce94e7b96b9165c09d44e93691de279e9953979045423c1249a032fc917ea73b7d98f6a4f533ba3212474
SSDEEP
12288:U/QBKxqmGt/5E8jrIj46zSXDvcuRQEjeTNOr6wDf:AqKxCt/5BjsFzoDvdQEKB7wT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetupCloseInfFile
SetupDiDeleteDeviceInterfaceData
SetupOpenLog
SetupUninstallNewlyCopiedInfs
CM_Get_Log_Conf_Priority
CM_Get_Sibling
LCMapStringA
AllocConsole
CloseHandle
CompareStringA
CreateEventA
CreateFileA
DeleteCriticalSection
DisconnectNamedPipe
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
FreeResource
FreeUserPhysicalPages
GetACP
GetCPInfo
GetCommandLineA
GetConsoleDisplayMode
GetCurrentConsoleFont
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileType
GetFullPathNameA
GetHandleInformation
GetLargestConsoleWindowSize
GetLastError
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessIoCounters
GetProcessPriorityBoost
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTimeAsFileTime
GetTapePosition
GetTapeStatus
GetThreadLocale
GetThreadPriority
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalDeleteAtom
GlobalFix
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
Heap32ListNext
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidLocale
lstrcpynA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadModule
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LocalReAlloc
MapViewOfFile
Module32First
Module32FirstW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
ResetEvent
ResumeThread
RtlUnwind
SetCommMask
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetLastError
SetProcessAffinityMask
SetSystemTime
SetThreadExecutionState
SetThreadLocale
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteFile
_hread
_lopen
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
AreAllAccessesGranted
SafeArrayPutElement
VariantInit
VariantCopyInd
VariantCopy
VariantChangeType
VarR4FromI2
VarI1FromDate
LPSAFEARRAY_Unmarshal
OleCreatePictureIndirect
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SysAllocStringLen
SysFreeString
VarCmp
VarCyFromUI4
socket
ntohl
htonl
gethostname
EnumThreadWindows
keybd_event
UnhookWinEvent
LoadStringA
GetKeyboardType
CharNextA
ExecCodeModuleEx
FromNode
TypeError
chunk_error
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ