getActiveDesktop
getWnd
Static task
static1
Behavioral task
behavioral1
Sample
44306fe8c0cb213f94f63b5f1720ac70f79ca3e7de9148a662750c07d514ebd1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
44306fe8c0cb213f94f63b5f1720ac70f79ca3e7de9148a662750c07d514ebd1.dll
Resource
win10v2004-20220812-en
Target
44306fe8c0cb213f94f63b5f1720ac70f79ca3e7de9148a662750c07d514ebd1
Size
16KB
MD5
0e37cb34559a7df1decfe0ff6287c2da
SHA1
2f11b9de33e74baf8951a21a6aa863579033f92b
SHA256
44306fe8c0cb213f94f63b5f1720ac70f79ca3e7de9148a662750c07d514ebd1
SHA512
4aa8ad5be52c51db646c4e309b1c911700839b5d537741b8b797d344d1b1fad3fe01cae2c969e7f9c9b7cc88d9f45acee2881bf0288bdd1b040c2a58c150f4fd
SSDEEP
384:ISDYEK63sE8RLzx7XrzBTRDWrrkbkJyhx0hx6hxThxMWCVW:ImK6cHLt7XBUrIYycCrU
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sleep
DisableThreadLibraryCalls
lstrcmpiW
CreateThread
WideCharToMultiByte
VirtualFreeEx
MultiByteToWideChar
lstrcmpiA
GetProcAddress
VirtualAllocEx
GetModuleHandleA
GetCurrentProcessId
lstrcmpA
VirtualFree
VirtualAlloc
GetModuleHandleW
GetModuleFileNameA
VirtualProtect
IsBadReadPtr
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExW
RtlFreeAnsiString
NtQueryInformationThread
NtClose
RtlUnicodeStringToAnsiString
NtOpenProcess
strstr
memset
memcpy
getActiveDesktop
getWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ