PqlufQi
SaGrcgmnTyKC
ThnwJKRRj
jxOkYkkV
uHakGBPJcka
Static task
static1
Behavioral task
behavioral1
Sample
a35835c92e7a17033702aea276e0689b395511d7c511a82f15800209ed393048.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a35835c92e7a17033702aea276e0689b395511d7c511a82f15800209ed393048.dll
Resource
win10v2004-20221111-en
Target
a35835c92e7a17033702aea276e0689b395511d7c511a82f15800209ed393048
Size
70KB
MD5
5ca9c3a047ffb391fd27994e277e785f
SHA1
a0fecd572c3c06bd4a5f2e54bc9f6785322d8b17
SHA256
a35835c92e7a17033702aea276e0689b395511d7c511a82f15800209ed393048
SHA512
788f6ee9d10f7f890962009b8fc049fb6635a340ae60d24290d5c367e2c28edf7eca49722d3af89b6a69963cf172c80250dcaf1b2d25b47c9fdee1bde6710b6b
SSDEEP
1536:idN7ZCuaGsOQPZqSbNHiCHo5hL0v9LbD5UXS7:aEqSMDhL0vB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
free
_XcptFilter
_initterm
_amsg_exit
_except_handler3
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
InterlockedExchange
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetLastError
CreateMutexA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
lstrlenA
lstrcpyA
FindAtomA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
Sleep
OpenProcess
GetCurrentThreadId
GetTempFileNameA
ClientToScreen
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
FindWindowA
GetWindowThreadProcessId
CloseDesktop
IsWindowVisible
InflateRect
GetFocus
GetWindowRect
GetCursorPos
EqualRect
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteValueA
SHGetValueA
SHSetValueA
SHDeleteKeyA
GetBkMode
GetBkColor
PqlufQi
SaGrcgmnTyKC
ThnwJKRRj
jxOkYkkV
uHakGBPJcka
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ