GWWuyzgjoak
ILPbXKq
eEAPBnQKhBDm
gUoKTXb
vixUNsiRBSsc
Static task
static1
Behavioral task
behavioral1
Sample
81a605bfb7d1b41fda669dfaff2b852ff33df1b2aae37ad3bfb5147e708386c8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
81a605bfb7d1b41fda669dfaff2b852ff33df1b2aae37ad3bfb5147e708386c8.dll
Resource
win10v2004-20221111-en
Target
81a605bfb7d1b41fda669dfaff2b852ff33df1b2aae37ad3bfb5147e708386c8
Size
71KB
MD5
7ad35700e8715188e5824c247ca9b263
SHA1
629eacfe34cc9665a9ffe78b80ae9a5d3d56db39
SHA256
81a605bfb7d1b41fda669dfaff2b852ff33df1b2aae37ad3bfb5147e708386c8
SHA512
9f972207ec4dfef31a2e06a21e34a08b5cc16778d0a4fb13f1692a4420758ede2ab604d5a0b51b7760a379d4ccb9795fe3eae393c5d95773d4ed2bf05849a184
SSDEEP
1536:DTs0smUgwr3JojIaXrJwuW+/+4Kq621zmjyh1LS:s1mpw1zabJwuvKqhV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
free
_XcptFilter
_initterm
_amsg_exit
_except_handler3
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
InterlockedExchange
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetLastError
CreateMutexA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
lstrlenA
lstrcpyA
GetProcessHeap
FindAtomA
HeapFree
ReadFile
HeapAlloc
GetFileSize
Sleep
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetFocus
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
FindWindowA
GetWindowThreadProcessId
CloseDesktop
IsWindowVisible
GetWindowRect
EqualRect
InflateRect
ClientToScreen
GetCursorPos
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteValueA
SHGetValueA
SHSetValueA
SHDeleteKeyA
GetBkColor
GetBkMode
GWWuyzgjoak
ILPbXKq
eEAPBnQKhBDm
gUoKTXb
vixUNsiRBSsc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ