pfjaoidjgfdjkj
pfjaoidjglkajd
Static task
static1
Behavioral task
behavioral1
Sample
d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77.dll
Resource
win10v2004-20221111-en
Target
d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77
Size
49KB
MD5
b8b6eca57f6a09e56bb5d95f00fa71a8
SHA1
4bc2cb6d5cf8dd5de1d99ed8e0da1658b41b5da0
SHA256
d62c9f0ed8eca6e6fdbfee28cd790084bbca2b3f2fa46bd416b0cfbb9a883b77
SHA512
b04440fba53786653e82500ff1e12059af9c1eee7a91dccfa5fc1f37fda17c247df4e131f25d025aa573763a676f2f67691ebe27c1a48b730d170b2cd3c342d8
SSDEEP
768:Mq5dPwMoCTnxQkE6rJWcZQr6BofkQOgwoM7bGYdfRNhX2:FdT/jxQkE6rEWYkQORFbGqdX2
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileSize
CreateFileA
GetModuleFileNameA
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
GetProcAddress
FindClose
FindFirstFileA
OpenProcess
GetTempPathA
GetCurrentProcess
ReleaseMutex
GetLastError
CreateMutexA
Process32First
Sleep
DeleteFileA
GetLocalTime
ReadFile
SetFilePointer
IsBadReadPtr
VirtualFree
VirtualAlloc
SetThreadPriority
CreateThread
GetTickCount
GetPrivateProfileStringA
ExitProcess
TerminateProcess
WritePrivateProfileStringA
DeviceIoControl
Module32Next
Module32First
lstrcmpiA
SetUnhandledExceptionFilter
Process32Next
HeapAlloc
GetProcessHeap
VirtualProtect
CreateToolhelp32Snapshot
GetCurrentProcessId
CloseHandle
FindWindowA
GetDesktopWindow
GetWindowTextA
GetClassNameA
GetWindow
wsprintfA
PostMessageA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
strstr
_strcmpi
sscanf
_vsnprintf
rand
srand
strrchr
_strnicmp
_strlwr
_strupr
??2@YAPAXI@Z
memset
memcpy
_except_handler3
strcat
strlen
_itoa
_stricmp
free
malloc
strchr
sprintf
strncpy
isspace
isalnum
atoi
strcpy
??3@YAXPAX@Z
WSAStartup
closesocket
send
connect
shutdown
socket
recv
htons
pfjaoidjgfdjkj
pfjaoidjglkajd
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ