CallFunction5
FileExFlags
FromVoidPtrAndDesc
LocalsToFast
Long_FromString
Number_Index
_strtol
destroy_read_struct
Static task
static1
Behavioral task
behavioral1
Sample
1de74b4c1510a83da53c1cfedafd4c101269f177a5301b050ab5639835b7c32f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1de74b4c1510a83da53c1cfedafd4c101269f177a5301b050ab5639835b7c32f.dll
Resource
win10v2004-20221111-en
Target
1de74b4c1510a83da53c1cfedafd4c101269f177a5301b050ab5639835b7c32f
Size
584KB
MD5
3beddd21220895ff9262ee6a355da320
SHA1
0396e32090a393c1d335b18ff1afae5e2d011537
SHA256
1de74b4c1510a83da53c1cfedafd4c101269f177a5301b050ab5639835b7c32f
SHA512
49a1c96e3c46954f53563b67ee03d2ccb8868e7d7d0bc6a3cae91c532eee45b1a638031e812c0dcbce2d4993778198fd15590910b94051cb6da974815feb1afd
SSDEEP
12288:KsG9mPWEa5vMF/5PRwOtdRqG1VVYBEtWYYma:KsWmm45fwGHcYYm
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
FillRect
GetParent
MessageBoxA
WindowFromDC
UnhookWindowsHookEx
GetWindowRect
GetDC
wsprintfA
GetWindowThreadProcessId
SetWindowsHookExA
ReleaseDC
DestroyWindow
GetWindowLongA
GetDesktopWindow
GetClientRect
ClientToScreen
BitBlt
GetDIBits
DeleteObject
DeleteDC
GetPaletteEntries
CreateDIBSection
GetDeviceCaps
DescribePixelFormat
SetDIBColorTable
SelectObject
CreateFontIndirectA
CreateSolidBrush
CreateCompatibleDC
GetOutlineTextMetricsA
GetObjectType
GetCurrentObject
GetRasterizerCaps
ExtEscape
GetGlyphOutlineA
GetPixelFormat
CreateCompatibleBitmap
_stricmp
_assert
free
memset
floor
sscanf
rand
fprintf
qsort
exit
sprintf
strstr
fflush
bsearch
strcmp
sqrt
getenv
fgets
_iob
ungetc
strcpy
fclose
atof
_filbuf
memmove
_ftol
memcmp
abort
printf
fread
atoi
calloc
fopen
strtok
fscanf
ftell
_CIpow
fwrite
fseek
realloc
strncmp
memcpy
malloc
atol
VirtualAlloc
OutputDebugStringA
GetTickCount
GetLastError
InitializeCriticalSection
FreeLibrary
GlobalAlloc
GetDateFormatA
SetThreadPriority
LeaveCriticalSection
VirtualFree
Sleep
EnterCriticalSection
GetCurrentThreadId
GetModuleFileNameA
TlsFree
TlsGetValue
GetThreadSelectorEntry
CreateFileA
GetProcAddress
TlsSetValue
GetModuleHandleA
GetVersionExA
GetStartupInfoA
LoadLibraryA
DeleteCriticalSection
TlsAlloc
GlobalSize
GlobalFree
GetTempPathA
WriteFile
GetCurrentThread
SetLastError
DirectDrawCreate
CallFunction5
FileExFlags
FromVoidPtrAndDesc
LocalsToFast
Long_FromString
Number_Index
_strtol
destroy_read_struct
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ