PseudocodeEncodingClass
PseudocodeKeyboard
PseudocodeProgramming
PseudocodeVersionFinder
PseudocodeWidgetSubdirectory
Static task
static1
Behavioral task
behavioral1
Sample
fe05317101ef3ff921054d20077d604b240e20780180b624344ce878ccd0c1a3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe05317101ef3ff921054d20077d604b240e20780180b624344ce878ccd0c1a3.dll
Resource
win10v2004-20220812-en
Target
fe05317101ef3ff921054d20077d604b240e20780180b624344ce878ccd0c1a3
Size
143KB
MD5
83796eeaed252bffe4d863daa8a1a4d0
SHA1
1b23e2a249d999fc845143efcf5f5d73671fae0a
SHA256
fe05317101ef3ff921054d20077d604b240e20780180b624344ce878ccd0c1a3
SHA512
0608c256de78e388be84ad89d9bd72b50d2c063cb7ce58f41e783954419f4877b81c010bb483c57e8ea10490aadece0469e469d82e3da5f9a413e8e4855b8f63
SSDEEP
1536:SC0ZWZ6jRWeuxQpL1mBW5VrOqnVhYUJj1LYCA1npbZJQKWAz9wOFR3cbqQ+:x0ZE6tHudWxOUjsnTOGJbR3cbqP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
SetConsoleWindowInfo
ProcessIdToSessionId
EnumSystemLanguageGroupsW
_lwrite
GetLargestConsoleWindowSize
GetProcessHeap
GetProcessIoCounters
WriteConsoleOutputCharacterA
MoveFileExA
SetEvent
GlobalFree
SetInformationJobObject
BindIoCompletionCallback
VirtualAlloc
GetCalendarInfoW
SetHandleCount
EnumCalendarInfoW
CompareFileTime
FindVolumeMountPointClose
lstrcpyA
FillConsoleOutputCharacterW
CreateThread
FindNextVolumeMountPointA
CreateSemaphoreA
SleepEx
AssignProcessToJobObject
lstrcmpW
GetWindowsDirectoryA
GlobalFlags
lstrcatA
GetLocaleInfoW
CloseHandle
LocalFlags
lstrlenA
GetCurrencyFormatW
VirtualAlloc
memcpy
strlen
FindFirstFreeAce
InitiateSystemShutdownExW
CreatePrivateObjectSecurityEx
CryptDeriveKey
PseudocodeEncodingClass
PseudocodeKeyboard
PseudocodeProgramming
PseudocodeVersionFinder
PseudocodeWidgetSubdirectory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ