AKeHmsuwwzw
AkwsydeJN
BqEnFFIP
HTtiPoNdPL
urZCTxPe
Static task
static1
Behavioral task
behavioral1
Sample
7389bee7121d9bb611e44503dd2a63dfb7b7872766f1de1505507100c39458ab.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7389bee7121d9bb611e44503dd2a63dfb7b7872766f1de1505507100c39458ab.dll
Resource
win10v2004-20221111-en
Target
7389bee7121d9bb611e44503dd2a63dfb7b7872766f1de1505507100c39458ab
Size
78KB
MD5
698831b011c0b29fd8696122cbea6070
SHA1
119dd36d8d4f443918c405d871f03e7372c5d312
SHA256
7389bee7121d9bb611e44503dd2a63dfb7b7872766f1de1505507100c39458ab
SHA512
bee44b0fed114bcadd8c2efedb9f8b81d1058e6d7199a70cf035af25be3bd6e14dcd1cca06f6324bb3a1b7043eea69a68c091dd4c0fc5478b8f286e6cd0e7e23
SSDEEP
1536:IUzXUSo2t/K5HEA4d3/+0KA9B1YZvtqYkdNOfrU3lRtt1ZaiX:Aut/K5Hud3/+0p71YmYSeI3lRttHX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_except_handler3
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetModuleFileNameA
GetLastError
CreateMutexA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
Sleep
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
lstrlenA
lstrcpyA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
EqualRect
CloseDesktop
GetCursorPos
IsWindowVisible
InflateRect
GetFocus
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
CallNextHookEx
FindWindowA
SetWindowsHookExA
PostMessageA
ClientToScreen
GetWindowThreadProcessId
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
AKeHmsuwwzw
AkwsydeJN
BqEnFFIP
HTtiPoNdPL
urZCTxPe
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ