getActiveDesktop
getWnd
Static task
static1
Behavioral task
behavioral1
Sample
afe9e58ed7049fb5dd5112db9d4351b0ca780c93a269e0b3f18101a6908711f1.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
afe9e58ed7049fb5dd5112db9d4351b0ca780c93a269e0b3f18101a6908711f1.dll
Resource
win10v2004-20221111-en
Target
afe9e58ed7049fb5dd5112db9d4351b0ca780c93a269e0b3f18101a6908711f1
Size
17KB
MD5
84ef77bbd71ea79b4b4d4002799470a6
SHA1
a175c8a115a4ddba665b48313fdd33e1e5b07c7d
SHA256
afe9e58ed7049fb5dd5112db9d4351b0ca780c93a269e0b3f18101a6908711f1
SHA512
80c2885c77e93011997196cbc8cba4efc1218226e2b529284d42a5b4a27dde7404b095c8d48fe3e13eea4d4063f781b6b63efa96e18ec786fda2ac755a910b56
SSDEEP
384:aDnI6bOoU8RLzx7XrzBTRDWr4h/kJMHRQbWCVWua:2lb73Lt7XBUr4hMMHRQhza
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sleep
DisableThreadLibraryCalls
lstrcmpiW
CreateThread
WideCharToMultiByte
VirtualFreeEx
MultiByteToWideChar
lstrcmpiA
GetProcAddress
VirtualAllocEx
GetModuleHandleA
GetCurrentProcessId
lstrcmpA
VirtualFree
VirtualAlloc
GetModuleHandleW
GetModuleFileNameA
VirtualProtect
IsBadReadPtr
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExW
RtlFreeAnsiString
NtQueryInformationThread
NtClose
RtlUnicodeStringToAnsiString
NtOpenProcess
strstr
memset
memcpy
getActiveDesktop
getWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ