AcquireThread
GetItem
StreamWriter
write_end
write_png
Static task
static1
Behavioral task
behavioral1
Sample
48ae52b08999aad2a83b08e55464e69b2758210a3065622b6e382d93b65116f9.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
48ae52b08999aad2a83b08e55464e69b2758210a3065622b6e382d93b65116f9.dll
Resource
win10v2004-20221111-en
Target
48ae52b08999aad2a83b08e55464e69b2758210a3065622b6e382d93b65116f9
Size
592KB
MD5
bbea873222be4e8c8ed76b9924b029f0
SHA1
b7c99d535d59b23646573b97443bd6b9b0fee57f
SHA256
48ae52b08999aad2a83b08e55464e69b2758210a3065622b6e382d93b65116f9
SHA512
134bbba166ad42902eb5cc99a232bdb501284f2f709634241cbea653faee5700722c154906e29ac2229a98f85f958925af1c407e976334882f30ec0d3a4d4c29
SSDEEP
12288:6Iz5gezl/ATLHzYk6vfX1eaDGGctfzUAkMFOnmT1sVdoZbkS:xKE/84DQtLjkM4nMyjE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
TlsGetValue
OutputDebugStringA
GlobalSize
GetCurrentThreadId
DeleteCriticalSection
TlsAlloc
GetTickCount
SetThreadPriority
GetLastError
GetCurrentThread
GlobalAlloc
GetVersionExA
LoadLibraryA
InitializeCriticalSection
FreeLibrary
GetModuleFileNameA
LeaveCriticalSection
SetLastError
VirtualAlloc
VirtualFree
WriteFile
GetStartupInfoA
GetProcAddress
TlsFree
GetModuleHandleA
GlobalFree
CreateFileA
TlsSetValue
EnterCriticalSection
Sleep
GetDateFormatA
GetTempPathA
fgets
_stricmp
strncmp
memcmp
exit
strtok
memmove
fclose
realloc
strstr
strcmp
bsearch
sqrt
atol
fwrite
atoi
malloc
fprintf
memset
atof
fopen
_filbuf
getenv
fseek
fflush
calloc
qsort
_ftol
strcpy
_assert
_CIpow
rand
floor
abort
memcpy
fread
sprintf
ftell
free
printf
sscanf
_iob
fscanf
ungetc
GetObjectA
DeleteDC
SetDIBColorTable
GetObjectType
CreateCompatibleBitmap
GetRasterizerCaps
SelectObject
GetPaletteEntries
GetDeviceCaps
CreateFontIndirectA
CreateSolidBrush
CreateDIBSection
CreateCompatibleDC
GetOutlineTextMetricsA
DescribePixelFormat
BitBlt
GetGlyphOutlineA
DeleteObject
GetPixelFormat
ExtEscape
GetCurrentObject
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ReleaseDC
MessageBoxA
GetDesktopWindow
GetClientRect
GetParent
SetWindowsHookExA
WindowFromDC
GetDC
GetWindowThreadProcessId
GetWindowRect
UnhookWindowsHookEx
FillRect
ClientToScreen
wsprintfA
DestroyWindow
DirectDrawCreate
AcquireThread
GetItem
StreamWriter
write_end
write_png
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ