ExecCodeModule
Method_Self
Module_New
destroy_write_struct
Static task
static1
Behavioral task
behavioral1
Sample
68cc924d726c04977a660ce239bf1983ce46f808d517f9e6051692cdebf238bb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68cc924d726c04977a660ce239bf1983ce46f808d517f9e6051692cdebf238bb.dll
Resource
win10v2004-20220901-en
Target
68cc924d726c04977a660ce239bf1983ce46f808d517f9e6051692cdebf238bb
Size
592KB
MD5
3d04ad86acef477b03fff4f9b13276e0
SHA1
474cf97fdc11c8dd167abdefef73e157a9abc378
SHA256
68cc924d726c04977a660ce239bf1983ce46f808d517f9e6051692cdebf238bb
SHA512
1de30bd9e79f67282fbd21cd84b3123b53882c71a5dd1ca173a011242d5f42d6b5613ee616a5929ed940a8342cd51fed59a76ee8b45e114f1795bfc81429d8e1
SSDEEP
12288:5cvDZxud3s7BLU0R+74SzeUX+ZlzzBtEUZM9B5QK1e6y:5uxuS7BpR+ES1kBq9fQ/
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ClientToScreen
MessageBoxA
wsprintfA
UnhookWindowsHookEx
GetClientRect
GetWindowRect
GetDesktopWindow
ReleaseDC
GetProcessDefaultLayout
FillRect
GetDC
GetWindowThreadProcessId
WindowFromDC
DestroyWindow
GetParent
_assert
strtok
fseek
sprintf
_CIpow
fprintf
printf
strcmp
rand
free
fgets
strcpy
realloc
calloc
memcmp
fread
ungetc
_ftol
atof
fopen
exit
memset
abort
memmove
sqrt
_stricmp
sscanf
atoi
strstr
bsearch
memcpy
_iob
ftell
fclose
atol
fwrite
strncmp
malloc
getenv
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
TlsGetValue
EnterCriticalSection
SetThreadPriority
InitializeCriticalSection
GetFileSize
GetProcAddress
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
FreeLibrary
GetTickCount
CreateFileA
GetStartupInfoA
WriteFile
GlobalSize
GetDateFormatA
VirtualFree
LoadLibraryA
GlobalFree
GetModuleFileNameA
GlobalAlloc
GetLastError
GetTempPathA
GetModuleHandleA
SetLastError
GetVersionExA
LeaveCriticalSection
GetCurrentThread
VirtualAlloc
TlsFree
Sleep
ExecCodeModule
Method_Self
Module_New
destroy_write_struct
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ