AttributeError
Int_FromString
NoMemory
Number_ToBase
ReplaceErrors
Reversed_Type
get_pHYs
set_hIST
set_sCAL
Static task
static1
Behavioral task
behavioral1
Sample
07dbbee54a31c7ff13d2177505de828193d4dc90a740f957dbac0cfc297ea5fa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07dbbee54a31c7ff13d2177505de828193d4dc90a740f957dbac0cfc297ea5fa.dll
Resource
win10v2004-20221111-en
Target
07dbbee54a31c7ff13d2177505de828193d4dc90a740f957dbac0cfc297ea5fa
Size
620KB
MD5
55f422c284a35240f4c80aaf67f1d720
SHA1
d9e846ca343f50ba246c854d409f282c13b574fc
SHA256
07dbbee54a31c7ff13d2177505de828193d4dc90a740f957dbac0cfc297ea5fa
SHA512
5f56812932c9d334e09770c07848b375594a39a0bf6d2f091549041fe82c728818c9070549a4aa2b59be2a89fc6a1240f0597bb5fea75ef9f767602e64ddb5d4
SSDEEP
12288:CSvL7Pu7w3BXOrA8biIK0kDOZ0TX/IvQ5wpT9hSB:CSD7PujfbiInkzTXb+S
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetDesktopWindow
ReleaseDC
GetParent
ClientToScreen
FillRect
GetWindowRect
GetWindowThreadProcessId
UnhookWindowsHookEx
WindowFromDC
MessageBoxA
wsprintfA
DestroyWindow
GetClientRect
GetDC
GetModuleFileNameA
SetThreadPriority
SetLastError
CreateFileA
GlobalSize
EnterCriticalSection
TlsSetValue
GetModuleHandleA
Sleep
GlobalFree
TlsGetValue
GetProcAddress
DeleteCriticalSection
VirtualAlloc
InitializeCriticalSection
FreeLibrary
GetTempPathA
GetStartupInfoA
GetTickCount
LoadLibraryA
LeaveCriticalSection
GetLastError
TlsFree
WriteFile
GlobalAlloc
GetVersionExA
GetCurrentThreadId
VirtualFree
GetDateFormatA
GetCurrentThread
TlsAlloc
printf
atoi
bsearch
fseek
strcmp
getenv
exit
sprintf
rand
_filbuf
atol
memset
strcpy
realloc
_assert
sqrt
free
strstr
fclose
fwrite
fprintf
fread
strncmp
ungetc
memcpy
fgets
abort
_ftol
_CIpow
memmove
malloc
_iob
_stricmp
sscanf
atof
fopen
calloc
strtok
ftell
memcmp
AttributeError
Int_FromString
NoMemory
Number_ToBase
ReplaceErrors
Reversed_Type
get_pHYs
set_hIST
set_sCAL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ