EngineProc
process1
process2
process3
process5
Static task
static1
Behavioral task
behavioral1
Sample
bd049bd996c2cec47afb1df66f3fa973ad12b9611852d9851c5524f912921b79.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bd049bd996c2cec47afb1df66f3fa973ad12b9611852d9851c5524f912921b79.dll
Resource
win10v2004-20220812-en
Target
bd049bd996c2cec47afb1df66f3fa973ad12b9611852d9851c5524f912921b79
Size
164KB
MD5
80846040de656c5d0e1e17368532a387
SHA1
3456d95e7d634a448899972f3bc571f777451c49
SHA256
bd049bd996c2cec47afb1df66f3fa973ad12b9611852d9851c5524f912921b79
SHA512
a09967f143b56b1a81a4fa087ebe90592f099e3a605371e7b71d79e4e3cebc7677c7737421644f14517a296a9e1c2a30fb34c56b303a26eadeeb35e44ae54be9
SSDEEP
3072:81f0Uhf79GaiPlOfb9p4pHb6QehZaJrge5XVhGKjuTA5ZnduqKfrf+Oe0efD6eL:81fhhf79GaQlOfb9yZGQQZaJbBVhGKjt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord1084
ord1098
ord371
ord1175
ord762
ord293
ord577
ord764
ord266
ord265
ord1917
ord1187
ord1191
__CppXcptFilter
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
memset
strncmp
strncpy
realloc
srand
rand
isspace
strchr
strpbrk
time
atoi
sprintf
_CxxThrowException
__CxxFrameHandler
memmove
_snprintf
printf
strstr
_access
_stricmp
_write
_close
_lseek
_open
free
malloc
_resetstkoflw
_except_handler3
_vscwprintf
vswprintf
wcslen
HeapDestroy
HeapReAlloc
GetWindowsDirectoryA
HeapFree
GetProcessHeap
InterlockedIncrement
InterlockedDecrement
MulDiv
FlushInstructionCache
GetCurrentProcess
HeapAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpA
HeapSize
CreateProcessA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
ExitProcess
LocalFree
LoadLibraryA
CopyFileA
MoveFileExA
GetCurrentThreadId
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FreeLibrary
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
lstrcmpiA
lstrlenW
lstrlenA
EnterCriticalSection
LeaveCriticalSection
GetPrivateProfileStringA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
GetPriorityClass
OpenProcess
OutputDebugStringW
GetTickCount
WritePrivateProfileStringA
Sleep
CreateThread
GetModuleFileNameA
Thread32Next
Thread32First
GetProcessId
DeleteFileA
MoveFileA
GetModuleHandleA
UpdateWindow
ShowWindow
RegisterClassA
LoadIconA
MessageBoxA
GetWindowThreadProcessId
PeekMessageA
SetTimer
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
CreateAcceleratorTableA
CharNextA
GetMessageA
GetClassNameA
SetWindowPos
RegisterWindowMessageA
RedrawWindow
DestroyAcceleratorTable
GetDlgItem
SetFocus
GetFocus
IsChild
GetWindow
BeginPaint
EndPaint
CallWindowProcA
GetDesktopWindow
InvalidateRgn
TranslateMessage
SetWindowTextA
GetParent
PostQuitMessage
InvalidateRect
ReleaseDC
GetDC
GetClientRect
FillRect
SetCapture
ReleaseCapture
DestroyWindow
GetWindowTextLengthA
GetSysColor
DefWindowProcA
SendMessageA
CreateWindowExA
SetWindowLongA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetWindowLongA
GetForegroundWindow
GetWindowTextA
IsWindow
UnregisterClassA
DispatchMessageA
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
DeleteObject
SelectObject
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
ShellExecuteA
PathFileExistsA
OleUninitialize
OleInitialize
CoTaskMemRealloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CoInitialize
CoCreateInstance
CoTaskMemFree
VarUI4FromStr
LoadTypeLi
SysFreeString
VariantClear
VariantCopy
VariantChangeType
VariantInit
SysAllocStringLen
SysAllocString
SysStringLen
SysStringByteLen
OleCreateFontIndirect
LoadRegTypeLi
GetModuleFileNameExA
EngineProc
process1
process2
process3
process5
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ