pfjaoidjgfdjkj
pfjaoidjglkajd
Static task
static1
Behavioral task
behavioral1
Sample
5d8a4fd1e81cb6cea9eb271dcd2fae5890de679c0af9189e7cb43a946d73e4a2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5d8a4fd1e81cb6cea9eb271dcd2fae5890de679c0af9189e7cb43a946d73e4a2.dll
Resource
win10v2004-20220901-en
Target
5d8a4fd1e81cb6cea9eb271dcd2fae5890de679c0af9189e7cb43a946d73e4a2
Size
75KB
MD5
67963fc5c00078d135b3656ae148cd46
SHA1
d6b2c946073c5ebcbebf4f9f84975602ad6459e3
SHA256
5d8a4fd1e81cb6cea9eb271dcd2fae5890de679c0af9189e7cb43a946d73e4a2
SHA512
98a60d1f1ab962494cc0c87d7a47947751b488febcbfa4641dd34cb9699852acf36cc1771b4fb80aafae5f7b38c877676efdfd35f676613b9fce8e527c9a8290
SSDEEP
1536:SCDEqdCvT++YN0kZa5J3JqaVr0tZtA37MtsQuIbz7HGCDlz3plysFK6k:SVTbRamyaVwtZtA37MtsQXfmISsFNk
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetModuleHandleA
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
FindClose
FindFirstFileA
OpenProcess
GetTempPathA
ReleaseMutex
GetLastError
CreateMutexA
Sleep
DeleteFileA
GetLocalTime
ReadFile
SetFilePointer
IsBadReadPtr
VirtualFree
ReadProcessMemory
VirtualAlloc
VirtualQueryEx
SetThreadPriority
CreateThread
CopyFileA
GetTickCount
GetPrivateProfileStringA
TerminateProcess
GetCurrentProcess
ExitProcess
WritePrivateProfileStringA
DeviceIoControl
lstrcmpiA
SetUnhandledExceptionFilter
GetModuleFileNameA
CreateFileA
GetFileSize
Process32First
Process32Next
HeapAlloc
GetProcessHeap
VirtualProtect
CreateToolhelp32Snapshot
GetCurrentProcessId
CloseHandle
FindWindowA
GetDesktopWindow
GetClassNameA
PostMessageA
DrawTextA
SendMessageA
DefWindowProcA
ClipCursor
SetWindowTextA
DestroyWindow
GetWindowLongA
DrawStateA
DrawFocusRect
BeginPaint
PostQuitMessage
LoadBitmapA
LoadCursorA
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetClientRect
MoveWindow
GetMessageA
TranslateMessage
DispatchMessageA
GetWindowTextA
IsWindowVisible
GetWindowRect
GetDC
ReleaseDC
GetWindowTextW
GetForegroundWindow
GetClassNameW
GetWindow
GetWindowThreadProcessId
wsprintfA
EndPaint
CreateSolidBrush
TextOutA
SetBkMode
CreatePatternBrush
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
SetTextColor
DeleteDC
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
_strcmpi
isalnum
isspace
strncpy
sprintf
strchr
malloc
free
isprint
_stricmp
_itoa
strlen
strcat
strcpy
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
mbstowcs
wcscat
wcscpy
wcslen
strstr
wcsncat
wcsstr
sscanf
_vsnprintf
rand
srand
strrchr
strncmp
memcmp
_strlwr
_strupr
atoi
_except_handler3
memcpy
memset
socket
WSAStartup
shutdown
htons
send
connect
closesocket
recv
GdipCreateBitmapFromHBITMAP
GdipSaveImageToFile
GdiplusShutdown
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipDisposeImage
GdiplusStartup
pfjaoidjgfdjkj
pfjaoidjglkajd
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ