KeyboardProcess
KeyboardPythonMultitasking
Static task
static1
Behavioral task
behavioral1
Sample
b859ad0a833644fee03759a9a86a6d0df812c6e4a17a280f08f62218e8bbc36e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b859ad0a833644fee03759a9a86a6d0df812c6e4a17a280f08f62218e8bbc36e.dll
Resource
win10v2004-20220812-en
Target
b859ad0a833644fee03759a9a86a6d0df812c6e4a17a280f08f62218e8bbc36e
Size
150KB
MD5
91f654683aa8aacc13cd63599be17780
SHA1
1126991ec4e48d80262cd5d0a4fac949bb4660cc
SHA256
b859ad0a833644fee03759a9a86a6d0df812c6e4a17a280f08f62218e8bbc36e
SHA512
7f539f1fc97ecf333d479871da65753ffc801fe071672e7e03f1e157fd77668346e8d34e1dff087d7b0dea1ace5a036ca7ceb4f6cbff5d5a44e8dc4191422108
SSDEEP
3072:IV/12LgfyFZxok9ZoZ9eDECvVmb6Nq7q:IV/12LgqFZxok9ZoZBYq
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenEventW
GetCurrentProcess
PeekNamedPipe
UnlockFile
GetProfileIntA
WaitNamedPipeW
GetTapeStatus
GetCommandLineA
VirtualAlloc
TerminateThread
CreateEventW
GetLocaleInfoW
SetHandleCount
CloseHandle
DeviceIoControl
MoveFileExA
LocalFlags
EnumResourceLanguagesW
lstrlenA
GetExitCodeProcess
EnumDateFormatsExW
GetFileInformationByHandle
VirtualAlloc
memcpy
strlen
InitiateSystemShutdownExW
EnumServicesStatusExA
SetAclInformation
FindFirstFreeAce
CryptDeriveKey
OpenEventLogA
GetFileSecurityA
CreatePrivateObjectSecurityEx
GetFileSecurityW
ReadEventLogA
KeyboardProcess
KeyboardPythonMultitasking
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ