SSaPJOP
kWfzsBkQx
pyvIMz
rUfVTjtHH
ufsuge
Static task
static1
Behavioral task
behavioral1
Sample
7c654cb6d4dbb6749f0f04e6aaac4902d940e1c004e8204e71f32708a3c52703.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c654cb6d4dbb6749f0f04e6aaac4902d940e1c004e8204e71f32708a3c52703.dll
Resource
win10v2004-20221111-en
Target
7c654cb6d4dbb6749f0f04e6aaac4902d940e1c004e8204e71f32708a3c52703
Size
60KB
MD5
c7b01dcd9e3ea31789f47b12ab6f8680
SHA1
0848d74c0f366fdb1d53c747d7e7a22c7dd897aa
SHA256
7c654cb6d4dbb6749f0f04e6aaac4902d940e1c004e8204e71f32708a3c52703
SHA512
1382b717962e5bf58b8331367cf47701a41e0cb70d749903b498f741336838b4ac85c4ad3c285ed6bc100072e07697c6a119b3360a4e9992b332378e61cffd46
SSDEEP
768:cvN1gDtgywNCsZucRnPerxpt6kqM/OF9FAAvYhmGR5jepl/tsOfG/+DPLzYbekDw:UPZjg/GOQbGR5OWOcckhwemqsSC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcpynA
CreateEventA
GetVersionExA
lstrcmpA
VirtualAlloc
VirtualFree
lstrcmpiA
FreeLibrary
LoadLibraryA
GetSystemDirectoryA
GetSystemTime
MoveFileA
GetCurrentThreadId
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
GetTempPathA
ReleaseMutex
GetTickCount
GetVersion
GetVolumeInformationA
SetEvent
GetFileSize
SystemTimeToFileTime
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetTempFileNameA
DeleteFileA
GlobalAlloc
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
RtlUnwind
VirtualQuery
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
ExitProcess
WaitForSingleObject
CreateMutexA
OpenProcess
lstrcpyA
lstrcatA
lstrlenA
GetModuleHandleA
GetProcAddress
GetLastError
RaiseException
GetLocaleInfoA
GetModuleFileNameA
LoadIconA
DefWindowProcA
GetWindowTextA
CloseDesktop
SetThreadDesktop
GetThreadDesktop
OpenInputDesktop
MessageBoxA
LoadCursorA
FindWindowA
SetWindowsHookExA
PostMessageA
FindWindowExA
GetWindowThreadProcessId
InflateRect
ClientToScreen
GetCursorPos
IsWindowVisible
GetFocus
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
CallNextHookEx
wsprintfA
EqualRect
DispatchMessageA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegEnumValueA
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
OpenProcessToken
CreateProcessAsUserA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
SSaPJOP
kWfzsBkQx
pyvIMz
rUfVTjtHH
ufsuge
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ