FromFile
List_Size
get_image_width
write_chunk_data
Static task
static1
Behavioral task
behavioral1
Sample
f7c53ea49a95395983a99247fef1e9d999c1ccda09db2956921e48b45e140c4d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7c53ea49a95395983a99247fef1e9d999c1ccda09db2956921e48b45e140c4d.dll
Resource
win10v2004-20220812-en
Target
f7c53ea49a95395983a99247fef1e9d999c1ccda09db2956921e48b45e140c4d
Size
608KB
MD5
a5dc1f0126986230f15cb619fbb286b0
SHA1
014826a47efff0c119c2483c1b4c9a7d9a64baa5
SHA256
f7c53ea49a95395983a99247fef1e9d999c1ccda09db2956921e48b45e140c4d
SHA512
6ae4284542db2c24e8eae1ae6048477e39fa4f644af905e60e3ff204919f5f69bfcdb5357f020d847ab5be9198a4361e6b9964f732274fe692a943ac9b1f5fd4
SSDEEP
12288:7Ur5RdLbmPIWqas5HDWfkHcxx36rpCA9Qr5NmDioifhA:ozd+PIW45N8fqr0WQfmDbifS
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
strcmp
abort
_assert
atol
sprintf
strstr
atoi
_stricmp
_iob
printf
strtok
calloc
fwrite
fprintf
strncmp
fopen
sqrt
malloc
realloc
memmove
fseek
ftell
getenv
_CIpow
bsearch
memcpy
strcpy
sscanf
free
rand
fread
memset
_ftol
exit
fgets
fclose
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
QueryPerformanceCounter
GetProcAddress
GetVersionExA
DeleteCriticalSection
GetModuleFileNameA
LoadLibraryA
FreeLibrary
FlushConsoleInputBuffer
GetStartupInfoA
SetLastError
LeaveCriticalSection
GetModuleHandleA
TlsSetValue
TlsFree
TlsAlloc
GetTempPathA
GlobalAlloc
VirtualFree
CreateFileA
GlobalFree
InitializeCriticalSection
SetThreadPriority
VirtualAlloc
GetCurrentThreadId
WriteFile
GetTickCount
GetLastError
GlobalSize
GetCurrentThread
EnterCriticalSection
Sleep
GetDateFormatA
IsBadReadPtr
TlsGetValue
WindowFromDC
PrintWindow
UnhookWindowsHookEx
MessageBoxA
wsprintfA
GetDC
GetParent
WINNLSGetEnableStatus
GetWindowThreadProcessId
GetClientRect
ReleaseDC
GetWindowRect
FromFile
List_Size
get_image_width
write_chunk_data
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ