AlphaBlend
GetAdaptersAddresses
GetAdaptersInfo
GetBestInterface
GetIpAddrTable
GetIpForwardTable
GradientFill
TransparentBlt
waveOutGetNumDevs
Static task
static1
Behavioral task
behavioral1
Sample
c2c619a6295ce9b38868feec4ecae0388897f8e98ff22473264b51fdb582be39.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2c619a6295ce9b38868feec4ecae0388897f8e98ff22473264b51fdb582be39.dll
Resource
win10v2004-20220812-en
Target
c2c619a6295ce9b38868feec4ecae0388897f8e98ff22473264b51fdb582be39
Size
52KB
MD5
924748b84c8e4146c1d10fe4c9b72852
SHA1
a6ea73dfc3023244c427e54b6d9c861dd6e2d12f
SHA256
c2c619a6295ce9b38868feec4ecae0388897f8e98ff22473264b51fdb582be39
SHA512
bd8fcf55729e140eea3cf7e0d700ca1eb0907f74317bce89e7dab49eab3f43e7ad1255f05c734d06188e3982364999f79595dedc21f5b6f435e33711fd5588da
SSDEEP
1536:JoptqpxSbfvLrw1EztUYo14rEhQcS+mB0go0r:WptswrvLrw1Eztto+rEhQcS+Io0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAllocEx
VirtualProtect
GetProcAddress
LoadLibraryA
CopyFileA
GetSystemDirectoryA
CloseHandle
TerminateThread
CreateThread
GetLocalTime
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
ExpandEnvironmentStringsA
CreateProcessA
WritePrivateProfileStringA
GetTempPathA
GetPrivateProfileStringA
Sleep
GetTickCount
GetVersionExA
GetModuleFileNameA
EnumChildWindows
FindWindowA
FindWindowExA
IsWindowEnabled
GetWindow
GetClientRect
SendMessageA
PostMessageA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
_adjust_fdiv
_stricmp
_strnicmp
malloc
_initterm
free
??3@YAXPAX@Z
srand
__CxxFrameHandler
rand
_vsnprintf
time
strstr
inet_addr
htons
socket
recv
setsockopt
send
connect
sendto
closesocket
WSAStartup
gethostbyname
PathFindFileNameA
AlphaBlend
GetAdaptersAddresses
GetAdaptersInfo
GetBestInterface
GetIpAddrTable
GetIpForwardTable
GradientFill
TransparentBlt
waveOutGetNumDevs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ