pfjaoidjgfdjkj
pfjaoidjglkajd
Static task
static1
Behavioral task
behavioral1
Sample
7d17150f2ceaf154a86c8170592837e81a3f44647874de7ef8c0d27694bb404e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7d17150f2ceaf154a86c8170592837e81a3f44647874de7ef8c0d27694bb404e.dll
Resource
win10v2004-20220901-en
Target
7d17150f2ceaf154a86c8170592837e81a3f44647874de7ef8c0d27694bb404e
Size
48KB
MD5
8335f5dfee5bda199d9e5d8488b77ba0
SHA1
82adcc140f35b02a280068486deae902fe1c84c3
SHA256
7d17150f2ceaf154a86c8170592837e81a3f44647874de7ef8c0d27694bb404e
SHA512
04465d04e2cae26d9402855a8d70e7f9e5eac0eecb68c0710574e32099cada580ffe74e152d0f21bec16f31be6eda158b5c87f10179e2cf77bc3145272f14db7
SSDEEP
768:1gOdPwtHufm7GV9Us4LjMcZBMoGzCc71V8yNuLjrsDGiBKX:3dKZSV9Us4xqN71VVNgrsDZBKX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MultiByteToWideChar
GetProcAddress
FindClose
FindFirstFileA
OpenProcess
GetTempPathA
GetCurrentProcess
ReleaseMutex
GetLastError
CreateMutexA
GetFileSize
DeleteFileA
GetLocalTime
ReadFile
SetFilePointer
IsBadReadPtr
VirtualFree
VirtualAlloc
SetThreadPriority
CreateThread
GetTickCount
GetPrivateProfileStringA
ExitProcess
TerminateProcess
WritePrivateProfileStringA
DeviceIoControl
Module32Next
Module32First
lstrcmpiA
SetUnhandledExceptionFilter
Process32First
Process32Next
HeapAlloc
GetProcessHeap
VirtualProtect
CreateToolhelp32Snapshot
GetCurrentProcessId
CloseHandle
GetModuleHandleA
LoadLibraryA
GetModuleFileNameA
CreateFileA
Sleep
GetDesktopWindow
GetWindowTextA
GetClassNameA
PostMessageA
GetWindow
wsprintfA
FindWindowA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
AdjustTokenPrivileges
_strcmpi
strstr
sscanf
_vsnprintf
rand
srand
strrchr
_strnicmp
_strlwr
_strupr
??2@YAPAXI@Z
memset
memcpy
_except_handler3
strcat
strlen
_itoa
_stricmp
free
malloc
strchr
sprintf
strncpy
isspace
isalnum
atoi
strcpy
??3@YAXPAX@Z
WSAStartup
closesocket
send
connect
shutdown
socket
recv
htons
pfjaoidjgfdjkj
pfjaoidjglkajd
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ