pfjaoidjgfdjkj
pfjaoidjglkajd
Static task
static1
Behavioral task
behavioral1
Sample
82cd9adfe8defffd7a99c681570d32abe60e8a0bb91beb5d23f834cc4705c6b3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82cd9adfe8defffd7a99c681570d32abe60e8a0bb91beb5d23f834cc4705c6b3.dll
Resource
win10v2004-20220812-en
Target
82cd9adfe8defffd7a99c681570d32abe60e8a0bb91beb5d23f834cc4705c6b3
Size
75KB
MD5
f0ebdfb2f465f510e8d0d6c1423ba1f9
SHA1
647f1803616d632a1ef3798fd6e4417467597fcb
SHA256
82cd9adfe8defffd7a99c681570d32abe60e8a0bb91beb5d23f834cc4705c6b3
SHA512
b3e103d18fa48f1e5ca3bd76751c80cefffcbe07e6be7881f7c7387327e9765daa8d99b07e297012840588cbdc1869fc76b2a197259ac096dbc9e43c3b0bed4f
SSDEEP
1536:SCDEkdCvT++YN0kZa5J3JqaVr0tZtA37MtsQuIbz7HGCDlz3plysFK6x:STTbRamyaVwtZtA37MtsQXfmISsFNx
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetModuleHandleA
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
FindClose
FindFirstFileA
OpenProcess
GetTempPathA
ReleaseMutex
GetLastError
CreateMutexA
Sleep
DeleteFileA
GetLocalTime
ReadFile
SetFilePointer
IsBadReadPtr
VirtualFree
ReadProcessMemory
VirtualAlloc
VirtualQueryEx
SetThreadPriority
CreateThread
CopyFileA
GetTickCount
GetPrivateProfileStringA
TerminateProcess
GetCurrentProcess
ExitProcess
WritePrivateProfileStringA
DeviceIoControl
lstrcmpiA
SetUnhandledExceptionFilter
GetModuleFileNameA
CreateFileA
GetFileSize
Process32First
Process32Next
HeapAlloc
GetProcessHeap
VirtualProtect
CreateToolhelp32Snapshot
GetCurrentProcessId
CloseHandle
FindWindowA
GetDesktopWindow
GetClassNameA
PostMessageA
DrawTextA
SendMessageA
DefWindowProcA
ClipCursor
SetWindowTextA
DestroyWindow
GetWindowLongA
DrawStateA
DrawFocusRect
BeginPaint
PostQuitMessage
LoadBitmapA
LoadCursorA
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetClientRect
MoveWindow
GetMessageA
TranslateMessage
DispatchMessageA
GetWindowTextA
IsWindowVisible
GetWindowRect
GetDC
ReleaseDC
GetWindowTextW
GetForegroundWindow
GetClassNameW
GetWindow
GetWindowThreadProcessId
wsprintfA
EndPaint
CreateSolidBrush
TextOutA
SetBkMode
CreatePatternBrush
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
SetTextColor
DeleteDC
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
_strcmpi
isalnum
isspace
strncpy
sprintf
strchr
malloc
free
isprint
_stricmp
_itoa
strlen
strcat
strcpy
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
mbstowcs
wcscat
wcscpy
wcslen
strstr
wcsncat
wcsstr
sscanf
_vsnprintf
rand
srand
strrchr
strncmp
memcmp
_strlwr
_strupr
atoi
_except_handler3
memcpy
memset
socket
WSAStartup
shutdown
htons
send
connect
closesocket
recv
GdipCreateBitmapFromHBITMAP
GdipSaveImageToFile
GdiplusShutdown
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipDisposeImage
GdiplusStartup
pfjaoidjgfdjkj
pfjaoidjglkajd
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ