RestoreThread
SetItemString
SimpleParseFile
SyntaxLocation
vResolveTokenVarA
Static task
static1
Behavioral task
behavioral1
Sample
d82f9553b05c9c57e43ccfebf1dfbc5f68bdd47432da7eea8bf775a278f13744.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d82f9553b05c9c57e43ccfebf1dfbc5f68bdd47432da7eea8bf775a278f13744.dll
Resource
win10v2004-20221111-en
Target
d82f9553b05c9c57e43ccfebf1dfbc5f68bdd47432da7eea8bf775a278f13744
Size
588KB
MD5
02a730cf2ff599d69e9df4d842457780
SHA1
27acd4940ab32b4e72e6433efd3c3470141739b8
SHA256
d82f9553b05c9c57e43ccfebf1dfbc5f68bdd47432da7eea8bf775a278f13744
SHA512
7caeb8f96c92aae454127ab6ce3d98b0392b21c6cc071de362cb62826451276d1083e3e11d025d0575b312998c7eabb29d38c1e536e9421d801600faa2a36548
SSDEEP
12288:kET3hqDhHa0aGvI+7HlqaZbdUC9dDaupHptLb1Oc8om:kE1BGvI+TM4dd9dDaKb1p
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
MessageBoxA
WindowFromDC
GetWindowRect
UnhookWindowsHookEx
GetWindowThreadProcessId
PrintWindow
ReleaseDC
GetParent
wsprintfA
GlobalAlloc
TlsSetValue
GlobalSize
GetTickCount
Sleep
GetModuleFileNameA
GetProcAddress
VirtualAlloc
TlsFree
FreeLibrary
VirtualFree
LeaveCriticalSection
IsBadReadPtr
SetLastError
CreateFileA
GetDateFormatA
GetLastError
GetStartupInfoA
LoadLibraryA
DeleteCriticalSection
InitializeCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
SetThreadPriority
EnterCriticalSection
GetModuleHandleA
GlobalFree
TlsGetValue
GetVersionExA
TlsAlloc
malloc
fwrite
rand
strtok
fseek
atol
_ftol
getenv
sprintf
fclose
sscanf
fgets
fopen
atoi
exit
_assert
sqrt
ftell
calloc
_CIpow
printf
_stricmp
fread
fprintf
strcpy
bsearch
_iob
strncmp
free
memmove
realloc
memcpy
abort
strcmp
memset
RestoreThread
SetItemString
SimpleParseFile
SyntaxLocation
vResolveTokenVarA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ