pfjaoidjgfdjkj
pfjaoidjglkajd
Static task
static1
Behavioral task
behavioral1
Sample
520be0d40db342e09c0a321da82922392409f43b3cda11968d41303321806455.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
520be0d40db342e09c0a321da82922392409f43b3cda11968d41303321806455.dll
Resource
win10v2004-20220812-en
Target
520be0d40db342e09c0a321da82922392409f43b3cda11968d41303321806455
Size
79KB
MD5
9147ba1c768d4962a5f8b07fff114fc1
SHA1
154859e98846d0db47a2ddae6bad157eb0a68d94
SHA256
520be0d40db342e09c0a321da82922392409f43b3cda11968d41303321806455
SHA512
f8863dc7be6db9a9952c788541448b19a449ee3ae5aceefadf77c592beb958d8921f1a039b9375840e6bc5f6c09f14d0058df7474e04e81aa2530d9d0482d0ab
SSDEEP
1536:JEd1xEZSqP7OCwnOBdjOtiQI+DpOYT0dZPNAm4xPjiuQ9hl:OjqPSFOLjONI+10ZPINiZ9H
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
FindClose
FindFirstFileA
WriteProcessMemory
OpenProcess
GetTempPathA
ReleaseMutex
GetLastError
CreateMutexA
GetSystemDirectoryA
LoadLibraryA
DeleteFileA
VirtualProtectEx
GetLocalTime
TerminateThread
CreateThread
ReadFile
SetFilePointer
IsBadReadPtr
VirtualFree
ReadProcessMemory
VirtualAlloc
VirtualQueryEx
SetThreadPriority
CopyFileA
GetTickCount
GetPrivateProfileStringA
CreateProcessA
CreateEventA
ExitProcess
TerminateProcess
GetCurrentProcess
WritePrivateProfileStringA
DeviceIoControl
lstrcmpiA
SetUnhandledExceptionFilter
GetModuleFileNameA
CreateFileA
GetFileSize
Process32First
Process32Next
HeapAlloc
GetProcessHeap
VirtualProtect
CreateToolhelp32Snapshot
GetCurrentProcessId
CloseHandle
Sleep
wsprintfA
GetWindow
GetClassNameW
GetForegroundWindow
GetWindowTextW
ReleaseDC
GetDC
GetWindowRect
IsWindowVisible
GetWindowTextA
PostMessageA
GetClassNameA
FindWindowA
GetDesktopWindow
CreateDCA
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
RegQueryValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
strstr
_strupr
_strlwr
memcmp
strrchr
srand
rand
_vsnprintf
sscanf
wcsstr
wcsncat
_strcmpi
wcslen
wcscpy
wcscat
mbstowcs
??2@YAPAXI@Z
wcscmp
memset
memcpy
_except_handler3
strcat
strlen
_itoa
_stricmp
isprint
free
malloc
strchr
sprintf
_errno
fflush
_iob
strcpy
strncpy
isspace
isalnum
atoi
??3@YAXPAX@Z
ntohs
inet_ntoa
getpeername
socket
listen
bind
recv
htons
connect
gethostbyname
closesocket
WSAEventSelect
WSACleanup
gethostname
inet_addr
recvfrom
sendto
accept
getsockname
WSAStartup
send
select
WSAEnumNetworkEvents
__WSAFDIsSet
GdiplusStartup
GdipSaveImageToFile
GdipDisposeImage
GdiplusShutdown
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipCreateBitmapFromHBITMAP
pfjaoidjgfdjkj
pfjaoidjglkajd
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ