RestoreThread
SetItemString
SimpleParseFile
SyntaxLocation
vResolveTokenVarA
Static task
static1
Behavioral task
behavioral1
Sample
a4a9a103156768e7c41a3d7edd307d1faf130b30c0131a44e951a0642c78dcbf.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4a9a103156768e7c41a3d7edd307d1faf130b30c0131a44e951a0642c78dcbf.dll
Resource
win10v2004-20220812-en
Target
a4a9a103156768e7c41a3d7edd307d1faf130b30c0131a44e951a0642c78dcbf
Size
592KB
MD5
f659b822da3f68264e4a4ff9d309a3a0
SHA1
78c2f64701b30ca74e1eb0a0b5bc60495dd58104
SHA256
a4a9a103156768e7c41a3d7edd307d1faf130b30c0131a44e951a0642c78dcbf
SHA512
8a1276c85d3081236c3ab1b2e34b1a05c561b38373496b5215fa6caebe055595f778dce064fdd67394cb3d0f24ef1e39e600344f71a299c1415c64f45a8824a8
SSDEEP
12288:Qoty+YOO+CJwtue/0AeCtYz7abe9A4ChNOr6q3ssmh//GYs:QotFYAWFGmi4ChNOr6q3nq/eYs
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
wsprintfA
ReleaseDC
UnhookWindowsHookEx
GetParent
GetWindowThreadProcessId
PrintWindow
MessageBoxA
GetClientRect
GetDC
fprintf
strcpy
fseek
getenv
_ftol
printf
fwrite
sscanf
_CIpow
fclose
memmove
_assert
atol
realloc
strncmp
exit
malloc
_stricmp
_iob
fread
memcpy
strcmp
bsearch
ftell
free
fopen
atoi
strstr
rand
abort
memset
sprintf
strtok
fgets
calloc
sqrt
LeaveCriticalSection
GetStartupInfoA
QueryPerformanceCounter
TlsFree
GlobalFree
VirtualFree
GetCurrentThreadId
FlushConsoleInputBuffer
SetLastError
GetCurrentThread
GetLastError
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
Sleep
LoadLibraryA
GlobalSize
SetThreadPriority
VirtualAlloc
IsBadReadPtr
GetVersionExA
GlobalAlloc
GetTickCount
TlsAlloc
TlsSetValue
CreateFileA
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GetDateFormatA
FreeLibrary
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RestoreThread
SetItemString
SimpleParseFile
SyntaxLocation
vResolveTokenVarA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ