GUlpFLGlpIFl
MkBWox
qboeja
toJbyBcMzRHQ
wBuAiLgW
Static task
static1
Behavioral task
behavioral1
Sample
9c473d61843064d08001d9fad683da145575dcb58829e86f54c591f27407d253.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c473d61843064d08001d9fad683da145575dcb58829e86f54c591f27407d253.dll
Resource
win10v2004-20220812-en
Target
9c473d61843064d08001d9fad683da145575dcb58829e86f54c591f27407d253
Size
105KB
MD5
42d92df45c0324a1126a9b8698af8d40
SHA1
70759bc4f010802e08e483b414f8df01c10283ed
SHA256
9c473d61843064d08001d9fad683da145575dcb58829e86f54c591f27407d253
SHA512
ee621d890cc0423c6d22a31c553c64160f2f9812659bd74b7bcce3ecb652283aa20f7a3b671fc9bc0691ed2f7de646661f060eb002c49e612f14264c6c2f3a56
SSDEEP
1536:dNxLKVgkPm/pdkd94dX6mh8IZzDolitOI9azvhaoDUqFN/4YhHC124FTCHbAR0F:oVgkSFlhBZzoDjZA2tkR
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrlenA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
Sleep
OpenProcess
GetCurrentThreadId
FindAtomA
GetTempFileNameA
GetTempPathA
DeleteFileA
VirtualAlloc
GlobalAlloc
FreeLibrary
LoadLibraryA
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
VirtualFree
CreateEventA
GetVersionExA
lstrcmpA
lstrcmpiA
GetSystemDirectoryA
GetSystemTime
MoveFileA
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
ReleaseMutex
GetTickCount
lstrcpynA
GetVolumeInformationA
SetEvent
SystemTimeToFileTime
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
HeapReAlloc
IsValidCodePage
GetOEMCP
lstrcatA
CreateFileA
WriteFile
CloseHandle
CreateProcessA
GetVersion
ExitProcess
GetModuleHandleA
GetProcAddress
WaitForSingleObject
lstrcpyA
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
CreateMutexA
GetLocaleInfoA
GetLastError
GetCommandLineA
RtlUnwind
VirtualQuery
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
FindWindowA
GetWindowThreadProcessId
CloseDesktop
InflateRect
GetWindowRect
EqualRect
IsWindowVisible
ClientToScreen
GetCursorPos
GetFocus
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
RegDeleteKeyA
OpenProcessToken
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
GUlpFLGlpIFl
MkBWox
qboeja
toJbyBcMzRHQ
wBuAiLgW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ