FileExFlags
Keys
List_GetSlice
Long_FromUnicode
MemberDescr_Type
ParseFile
SetBufSize
_Tuple
set_crc_action
Static task
static1
Behavioral task
behavioral1
Sample
789348b2330a86d01534f062566343cc8039d54cabd8adf1d82b8039d0351380.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
789348b2330a86d01534f062566343cc8039d54cabd8adf1d82b8039d0351380.dll
Resource
win10v2004-20221111-en
Target
789348b2330a86d01534f062566343cc8039d54cabd8adf1d82b8039d0351380
Size
392KB
MD5
6d073ccea9df5078a364961016065200
SHA1
50a885eeb74ae5f4fb69e92670a7e524034acd11
SHA256
789348b2330a86d01534f062566343cc8039d54cabd8adf1d82b8039d0351380
SHA512
40016f661e8a66b19217fad13919904baa12db6fd3ca353c60ba9b684dc47331a264db19368eb4ba75aed406561e7b4e4abc22edae3ec707011a8dcb6fdf5e4d
SSDEEP
6144:ZP5z07dzEcnRlzka0BMH+z9vNXxu/P9u8JkdcE7PtfuCA8CSza1V11:j07BXyMHiVX8Jkd5lfl2P
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_ftol
fopen
atoi
realloc
fwrite
strncmp
_iob
rand
getenv
fread
abort
sprintf
calloc
strstr
free
atol
fgets
memcpy
strcpy
strcmp
strtok
malloc
sscanf
fprintf
exit
memmove
_CIpow
memset
fseek
_stricmp
ftell
fclose
_assert
DeleteCriticalSection
GetLastError
SetThreadPriority
SetLastError
GetDateFormatA
QueryPerformanceCounter
InitializeCriticalSection
GetStartupInfoA
FreeLibrary
GlobalSize
GetCurrentThreadId
TlsFree
VirtualFree
VirtualAlloc
LeaveCriticalSection
Sleep
IsBadReadPtr
TlsSetValue
CreateFileA
GetProcAddress
TlsAlloc
EnterCriticalSection
GlobalAlloc
GlobalFree
TlsGetValue
GetTickCount
GetModuleFileNameA
LoadLibraryA
GetModuleHandleA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
GetWindowRect
ReleaseDC
MessageBoxA
GetParent
GetWindowThreadProcessId
wsprintfA
GetDC
FileExFlags
Keys
List_GetSlice
Long_FromUnicode
MemberDescr_Type
ParseFile
SetBufSize
_Tuple
set_crc_action
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ