IsTrue
New
Node_Free
SimpleParseFileFlags
SyntaxLocation
_snprintf
set_gamma
set_packing
vExecTokenW
Static task
static1
Behavioral task
behavioral1
Sample
78f8584f34ed8233b4d78b279b222c14b75084a39e5e252a9cc545ee44cd5eed.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78f8584f34ed8233b4d78b279b222c14b75084a39e5e252a9cc545ee44cd5eed.dll
Resource
win10v2004-20221111-en
Target
78f8584f34ed8233b4d78b279b222c14b75084a39e5e252a9cc545ee44cd5eed
Size
320KB
MD5
9723bf8858c923fcd19079f528590c70
SHA1
c866b48aad708f3e6b9e0ea53be2200b3a6f3290
SHA256
78f8584f34ed8233b4d78b279b222c14b75084a39e5e252a9cc545ee44cd5eed
SHA512
5a53cef353c42224b56356f12a5076ad2ab4e50c3458861986d9b3d09e5e81affd4e2f72dcbc22a5d04330f1696cd05fbc51d0398cd9e413c1c142bf52eafb10
SSDEEP
6144:CZUE7zq3UdgKpWxRY/DEWGP3Sk53lCP4XOJDFdxWaQT00:OzSUCK8xRYhGrmiOvdag0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
FillRect
GetParent
MessageBoxA
WindowFromDC
UnhookWindowsHookEx
GetWindowRect
GetDC
wsprintfA
GetWindowThreadProcessId
SetWindowsHookExA
ReleaseDC
DestroyWindow
GetWindowLongA
GetDesktopWindow
GetClientRect
ClientToScreen
BitBlt
GetDIBits
DeleteObject
DeleteDC
GetPaletteEntries
CreateDIBSection
GetDeviceCaps
DescribePixelFormat
SetDIBColorTable
SelectObject
CreateFontIndirectA
CreateSolidBrush
CreateCompatibleDC
GetOutlineTextMetricsA
GetObjectType
GetCurrentObject
GetRasterizerCaps
ExtEscape
GetGlyphOutlineA
GetPixelFormat
CreateCompatibleBitmap
_stricmp
_assert
free
memset
floor
sscanf
rand
fprintf
qsort
exit
sprintf
strstr
fflush
bsearch
strcmp
sqrt
getenv
fgets
_iob
ungetc
strcpy
fclose
atof
_filbuf
memmove
_ftol
memcmp
abort
printf
fread
atoi
calloc
fopen
strtok
fscanf
ftell
_CIpow
fwrite
fseek
realloc
strncmp
memcpy
malloc
atol
VirtualAlloc
OutputDebugStringA
GetTickCount
GetLastError
InitializeCriticalSection
FreeLibrary
GlobalAlloc
GetDateFormatA
SetThreadPriority
LeaveCriticalSection
VirtualFree
Sleep
EnterCriticalSection
GetCurrentThreadId
GetModuleFileNameA
TlsFree
TlsGetValue
GetThreadSelectorEntry
CreateFileA
GetProcAddress
TlsSetValue
GetModuleHandleA
GetVersionExA
GetStartupInfoA
LoadLibraryA
DeleteCriticalSection
TlsAlloc
GlobalSize
GlobalFree
GetTempPathA
WriteFile
GetCurrentThread
SetLastError
DirectDrawCreate
IsTrue
New
Node_Free
SimpleParseFileFlags
SyntaxLocation
_snprintf
set_gamma
set_packing
vExecTokenW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ