F2gjsricnrty
L8ofcjergg3
Ng1vdwegeyx
Pornograp1hy
Static task
static1
Behavioral task
behavioral1
Sample
cf75f254efd6d9014ae12251022b4c829c3a65165e2a6afc03b4d7149101a0dc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf75f254efd6d9014ae12251022b4c829c3a65165e2a6afc03b4d7149101a0dc.dll
Resource
win10v2004-20220812-en
Target
cf75f254efd6d9014ae12251022b4c829c3a65165e2a6afc03b4d7149101a0dc
Size
136KB
MD5
5e27a57b87ef486e34b89599896aae7b
SHA1
62c8f9dcd660f89b05687df93765230dd0fc5a2a
SHA256
cf75f254efd6d9014ae12251022b4c829c3a65165e2a6afc03b4d7149101a0dc
SHA512
84d4001f4de9d513855638ac6cf5c52b6d9632fe31ab91634f66e177088db29ef0d1ad4db067061e69b31eaa3820b896cd2a7f229cad0b40d713e4f06f8e6da1
SSDEEP
3072:QU4V44ivRcDKJBCHkaZLp9wMamAmPAeM9vl:Qf+WDeCEaNLTPAe
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
CoTaskMemFree
CoTaskMemAlloc
StringFromCLSID
OleInitialize
VirtualQuery
CreateEventA
LCMapStringW
FindFirstFileA
GetModuleFileNameA
HeapAlloc
InitializeCriticalSection
InterlockedDecrement
GetVersion
GetFileType
DeleteFileA
GetTempFileNameA
EnterCriticalSection
GetLocalTime
SetUnhandledExceptionFilter
IsBadWritePtr
GetCommandLineA
GetModuleHandleA
FlushFileBuffers
CreateFileA
HeapFree
GetOEMCP
TlsAlloc
IsBadReadPtr
FindClose
HeapReAlloc
CreateDirectoryA
GetProcAddress
GetLastError
RtlUnwind
OutputDebugStringA
GetStdHandle
LoadLibraryA
VirtualAlloc
GetCPInfo
TerminateProcess
SetHandleCount
GetStringTypeA
WaitForSingleObject
TlsFree
LoadResource
ExitProcess
GetStringTypeW
LeaveCriticalSection
SetLastError
FreeEnvironmentStringsA
GetTimeFormatA
DebugBreak
GetCurrentDirectoryA
LockResource
GetFileSize
FreeEnvironmentStringsW
LCMapStringA
MapViewOfFile
UnmapViewOfFile
TlsGetValue
CreateThread
IsBadCodePtr
WriteFile
GetDateFormatA
ReadFile
GetEnvironmentStrings
PulseEvent
GetEnvironmentStringsW
HeapCreate
GetTempPathA
GetLocaleInfoA
ResetEvent
CreateFileMappingA
TlsSetValue
GetACP
GetSystemInfo
GetVersionExA
GetModuleHandleW
InterlockedIncrement
GetCurrentThreadId
GetStartupInfoA
DeleteCriticalSection
WideCharToMultiByte
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryExA
Sleep
GetCurrentProcess
UnhandledExceptionFilter
MultiByteToWideChar
VirtualProtect
wsprintfA
LoadStringA
F2gjsricnrty
L8ofcjergg3
Ng1vdwegeyx
Pornograp1hy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ