InPlaceRshift
Int_FromSsize_t
IsSubclass
Method_Self
Values
_Fast
_New
info_init
write_rows
Static task
static1
Behavioral task
behavioral1
Sample
1ef7c2465b21898a097f9830743fe2997aa03576f7d2909c3c52ea696d723469.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ef7c2465b21898a097f9830743fe2997aa03576f7d2909c3c52ea696d723469.dll
Resource
win10v2004-20220901-en
Target
1ef7c2465b21898a097f9830743fe2997aa03576f7d2909c3c52ea696d723469
Size
308KB
MD5
22b26841eadc33c36e3f4f7383e7ae70
SHA1
11c619ca70790e1683f3acfadfafd49de0b8f91e
SHA256
1ef7c2465b21898a097f9830743fe2997aa03576f7d2909c3c52ea696d723469
SHA512
28ee3dc56ed4e9f0d6930c085dfa8aeb413c2648781c91cb5146f558e412f46dd38a7fb10d498132f5c518421d4d7250895e714ab6354ea412ac58efede2d245
SSDEEP
6144:almXQnCeIxNJeoubKT4YdjMhqh9WUqr4:5XCCR58OT4BhqHiE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_ftol
calloc
_CIpow
atof
bsearch
strcpy
malloc
fopen
_stricmp
fread
atol
printf
fclose
strncmp
fgets
_iob
sqrt
fseek
rand
memcpy
_filbuf
fwrite
_assert
exit
sprintf
realloc
abort
fprintf
getenv
ungetc
strtok
memcmp
atoi
strcmp
sscanf
memmove
memset
free
ftell
strstr
GetDC
GetParent
GetDesktopWindow
GetWindowRect
UnhookWindowsHookEx
ClientToScreen
DestroyWindow
GetClientRect
GetWindowThreadProcessId
WindowFromDC
wsprintfA
ReleaseDC
FillRect
MessageBoxA
TlsGetValue
GetTickCount
GlobalFree
GetVersionExA
LeaveCriticalSection
VirtualFree
GlobalSize
Sleep
CreateFileA
DeleteCriticalSection
SetThreadPriority
LoadLibraryA
GetLastError
TlsSetValue
TlsAlloc
VirtualAlloc
GetDateFormatA
WriteFile
EnterCriticalSection
SetLastError
GetTempPathA
GlobalAlloc
FreeLibrary
TlsFree
GetProcAddress
GetModuleFileNameA
GetCurrentThread
GetModuleHandleA
GetStartupInfoA
GetCurrentThreadId
InitializeCriticalSection
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
InPlaceRshift
Int_FromSsize_t
IsSubclass
Method_Self
Values
_Fast
_New
info_init
write_rows
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ