FromLong
FromVoidPtrAndDesc
Parse
SetDefaults
get_pHYs
method
set_crc_action
strategy
Static task
static1
Behavioral task
behavioral1
Sample
5b753a4205b76bb598e7ea8bb8599c9a463949dc3c375083520e943a46226cee.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b753a4205b76bb598e7ea8bb8599c9a463949dc3c375083520e943a46226cee.dll
Resource
win10v2004-20221111-en
Target
5b753a4205b76bb598e7ea8bb8599c9a463949dc3c375083520e943a46226cee
Size
332KB
MD5
3abd0d09ec489a3a7b2e12e5f816a0e0
SHA1
a5969de5323c6e3c7028ae8274b72dbbe18d173e
SHA256
5b753a4205b76bb598e7ea8bb8599c9a463949dc3c375083520e943a46226cee
SHA512
ce3ab23284b55662cb94d74bdc457c7827019cc894a612f2562a9989c657355e5125d936dacc34ce6ea69d0012a7baff202b1fc3cd7dc7be555e1f7ae6130d83
SSDEEP
6144:tu6ck22yd0hFTzWiO7V+UPNMm3djfedV9Tg6UgsxWqaZPxCFe:tkk22K0hRCiO71X3dzmvsgdqiPxC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReleaseDC
DestroyWindow
ClientToScreen
FillRect
GetParent
WindowFromDC
GetClientRect
GetDesktopWindow
GetWindowThreadProcessId
MessageBoxA
UnhookWindowsHookEx
wsprintfA
GetWindowRect
GetDC
fgets
rand
malloc
_filbuf
_assert
strcpy
memcpy
_ftol
_iob
abort
_CIpow
fprintf
ftell
sscanf
fseek
memmove
atoi
strncmp
free
fclose
fread
exit
fopen
fwrite
_stricmp
ungetc
strstr
bsearch
strcmp
sqrt
realloc
atol
memcmp
sprintf
atof
getenv
calloc
printf
memset
strtok
GlobalSize
GetVersionExA
GetTickCount
GlobalAlloc
LoadLibraryA
Sleep
DeleteCriticalSection
GetStartupInfoA
GetModuleHandleA
GetTempPathA
SetThreadPriority
FreeLibrary
GlobalFree
VirtualAlloc
TlsFree
GetCurrentThreadId
EnterCriticalSection
GetProcAddress
GetLastError
SetLastError
GetCurrentThread
CreateFileA
GetModuleFileNameA
InitializeCriticalSection
TlsGetValue
WriteFile
LeaveCriticalSection
GetDateFormatA
TlsSetValue
VirtualFree
TlsAlloc
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
FromLong
FromVoidPtrAndDesc
Parse
SetDefaults
get_pHYs
method
set_crc_action
strategy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ