GetFuncDesc
GetGlobals
WriteLongToFile
set_gray_to_rgb
Static task
static1
Behavioral task
behavioral1
Sample
ec2e64f1c77e476c600ad2c0c5fa08a626f9d2301c9cf15126b275e8db37afc5.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ec2e64f1c77e476c600ad2c0c5fa08a626f9d2301c9cf15126b275e8db37afc5.dll
Resource
win10v2004-20220901-en
Target
ec2e64f1c77e476c600ad2c0c5fa08a626f9d2301c9cf15126b275e8db37afc5
Size
348KB
MD5
7d849bc76c007a59786aa7d76a498a50
SHA1
33276903ed2ce0e1fc6e6315aa70825c4fc482bb
SHA256
ec2e64f1c77e476c600ad2c0c5fa08a626f9d2301c9cf15126b275e8db37afc5
SHA512
b4d9e45ec9264f233b65e2d2a9a338b263edcafdf450a2f8bc45050a8e20a955c4a8bb1398ffd9676ce939c2931587a62f16427823200d6e401eb4da42ac5511
SSDEEP
6144:cTdBHHhBfPelKKQA7/uTWd7nEAl/l6hee/pwxbDUN8ZAO16/:odBHBBPeTL5aYeobDD/g/
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReleaseDC
DestroyWindow
ClientToScreen
FillRect
GetParent
WindowFromDC
GetClientRect
GetDesktopWindow
GetWindowThreadProcessId
MessageBoxA
UnhookWindowsHookEx
wsprintfA
GetWindowRect
GetDC
fgets
rand
malloc
_filbuf
_assert
strcpy
memcpy
_ftol
_iob
abort
_CIpow
fprintf
ftell
sscanf
fseek
memmove
atoi
strncmp
free
fclose
fread
exit
fopen
fwrite
_stricmp
ungetc
strstr
bsearch
strcmp
sqrt
realloc
atol
memcmp
sprintf
atof
getenv
calloc
printf
memset
strtok
GlobalSize
GetVersionExA
GetTickCount
GlobalAlloc
LoadLibraryA
Sleep
DeleteCriticalSection
GetStartupInfoA
GetModuleHandleA
GetTempPathA
SetThreadPriority
FreeLibrary
GlobalFree
VirtualAlloc
TlsFree
GetCurrentThreadId
EnterCriticalSection
GetProcAddress
GetLastError
SetLastError
GetCurrentThread
CreateFileA
GetModuleFileNameA
InitializeCriticalSection
TlsGetValue
WriteFile
LeaveCriticalSection
GetDateFormatA
TlsSetValue
VirtualFree
TlsAlloc
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
GetFuncDesc
GetGlobals
WriteLongToFile
set_gray_to_rgb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ