pfjaoidjgfdjkj
pfjaoidjglkajd
Static task
static1
Behavioral task
behavioral1
Sample
8b9e4cd76c6a274c7377d03e3d9a00ec446623e3a61694d56f68c652efa17f76.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b9e4cd76c6a274c7377d03e3d9a00ec446623e3a61694d56f68c652efa17f76.dll
Resource
win10v2004-20220812-en
Target
8b9e4cd76c6a274c7377d03e3d9a00ec446623e3a61694d56f68c652efa17f76
Size
65KB
MD5
824fa32cd78f3e836639e552c25203a0
SHA1
97db11cfa2fa5f6af7bc2b6231cf62d9a0cb2105
SHA256
8b9e4cd76c6a274c7377d03e3d9a00ec446623e3a61694d56f68c652efa17f76
SHA512
cdb39f0e29eaaa4b28d9404ea6e6850f9d20f01281f3b40496b58d0a441351603c1e40c8c49f10d38604bfdbe41c1bc6dd33c63386f43d4df92cdb7b8c338796
SSDEEP
768:wCf0PiddPgdCL6RZ70qHUPjIN1GBjG4zDNIHhC+Z7GyxhPBMcxm86I2CgxGOA8wx:7cPMd6ZgPjIN1iG4Xuh53t6JAvX9mfy
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
FindClose
FindFirstFileA
OpenProcess
GetTempPathA
GetCurrentProcess
ReleaseMutex
GetLastError
CreateMutexA
Sleep
GetLocalTime
ReadFile
SetFilePointer
IsBadReadPtr
VirtualFree
ReadProcessMemory
VirtualAlloc
VirtualQueryEx
SetThreadPriority
CreateThread
CopyFileA
GetTickCount
GetPrivateProfileStringA
ExitProcess
TerminateProcess
WritePrivateProfileStringA
DeviceIoControl
GetCommandLineA
lstrcmpiA
SetUnhandledExceptionFilter
GetModuleHandleA
LoadLibraryA
GetModuleFileNameA
CreateFileA
GetFileSize
Process32First
Process32Next
HeapAlloc
GetProcessHeap
VirtualProtect
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
OpenThread
GetThreadContext
SetThreadContext
CloseHandle
Thread32Next
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteFileA
AddVectoredExceptionHandler
FindWindowA
GetWindowTextA
GetClassNameA
PostMessageA
IsWindowVisible
GetWindowRect
GetDC
ReleaseDC
GetWindowTextW
GetForegroundWindow
GetClassNameW
GetWindow
wsprintfA
GetDesktopWindow
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
DeleteDC
RegEnumKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
mbstowcs
_strcmpi
wcscat
wcscpy
wcslen
strstr
wcsncat
wcsstr
sscanf
_vsnprintf
rand
srand
strrchr
_strlwr
_strupr
??2@YAPAXI@Z
wcscmp
??3@YAXPAX@Z
memset
memcpy
_except_handler3
strcat
strlen
_itoa
_stricmp
free
malloc
strchr
sprintf
strncpy
isspace
isalnum
atoi
strcpy
WSAStartup
closesocket
send
connect
shutdown
socket
recv
htons
GdiplusShutdown
GdipCreateBitmapFromHBITMAP
GdipSaveImageToFile
GdipDisposeImage
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
pfjaoidjgfdjkj
pfjaoidjglkajd
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ