GetLocals
OverflowError
SetItem
StringARepr
_Tuple
Static task
static1
Behavioral task
behavioral1
Sample
0db0823307d4d31c4adfb2d19352b362b4f0b12cfb6e552704ec8285406a6e24.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0db0823307d4d31c4adfb2d19352b362b4f0b12cfb6e552704ec8285406a6e24.dll
Resource
win10v2004-20220901-en
Target
0db0823307d4d31c4adfb2d19352b362b4f0b12cfb6e552704ec8285406a6e24
Size
620KB
MD5
af8b3f147707c42fd649765433624ad0
SHA1
dc5fb073d8b05799e950221e803f69f9d8731d5d
SHA256
0db0823307d4d31c4adfb2d19352b362b4f0b12cfb6e552704ec8285406a6e24
SHA512
b4a99cb69a5f7586cbe618d38c7dd52e02e8749a226d84b400811a7747ffcf4dcacf7f01a05022af5c01076ad23a6d47ecbb2e4061117815c2a17af42d97535a
SSDEEP
12288:dENHzx58jUUpLKzD+ObPw1yJYzxsib52ic99AIKyUfM2E3:6TnTUpLGD+LliibvO9A5fM2W
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetStartupInfoA
TlsFree
GetVersionExA
GetModuleHandleA
LoadLibraryA
GlobalSize
SetLastError
GlobalAlloc
IsBadReadPtr
GetProcAddress
InitializeCriticalSection
GetCurrentThreadId
TlsSetValue
GetLastError
DeleteCriticalSection
GetTickCount
GetCurrentThread
FreeLibrary
QueryPerformanceCounter
TlsAlloc
WriteFile
GlobalFree
FlushConsoleInputBuffer
EnterCriticalSection
SetThreadPriority
TlsGetValue
Sleep
GetModuleFileNameA
GetDateFormatA
LeaveCriticalSection
CreateFileA
VirtualAlloc
GetTempPathA
VirtualFree
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
MessageBoxA
UnhookWindowsHookEx
FillRect
GetParent
WINNLSGetEnableStatus
GetClientRect
ReleaseDC
GetWindowThreadProcessId
DestroyWindow
GetDC
WindowFromDC
wsprintfA
atol
free
atoi
strstr
realloc
ftell
fwrite
sprintf
_stricmp
ungetc
strncmp
strcmp
sscanf
exit
_CIpow
getenv
fopen
bsearch
printf
strtok
malloc
_ftol
memmove
calloc
strcpy
rand
_assert
_iob
fgets
fclose
abort
fseek
fread
atof
fprintf
memcpy
GetLocals
OverflowError
SetItem
StringARepr
_Tuple
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ