_J6_l1TnEe@24
_tDg3nBeM@4
_jHJSJr9fN3Atid@12
g0ibhEy@24
e74j6yiuztCSL
_Jncr4Cx9fN
Y5SacpWsjio@24
1XhQoxKN5NX7V
_tEnp880rrhSl5p@12
_QixijjJ9@16
_mke9UlKhR@20
Static task
static1
Behavioral task
behavioral1
Sample
cdfba1340cee0cc04d7a5b92c1abd1f77fac8fa65991f826ed61a923a62eb55f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cdfba1340cee0cc04d7a5b92c1abd1f77fac8fa65991f826ed61a923a62eb55f.dll
Resource
win10v2004-20221111-en
Target
cdfba1340cee0cc04d7a5b92c1abd1f77fac8fa65991f826ed61a923a62eb55f
Size
189KB
MD5
ef5e5a8b358f78223bee051260dfb998
SHA1
c8231b5f7cbacc61d90e91718d98828b8700a07c
SHA256
cdfba1340cee0cc04d7a5b92c1abd1f77fac8fa65991f826ed61a923a62eb55f
SHA512
7e4eedace31372302f473a35040161c4e98d1e399d15d1e75d530513d71f631dc5f00c726b868ec47edd9d2e371437126305ea012b6885287183872e6b444610
SSDEEP
3072:A+tdVexRdmTd1CCBoZXEwgtIg+Z0otar9CTASM+/eHnKsRrRQiaUK/wLM34IWHUx:A+tdVexRSdxESIgfwa9CTpMkeHtRrwkH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetParent
OffsetRect
IntersectRect
SetWindowLongA
InflateRect
GetWindowLongA
DefWindowProcA
SetWindowLongW
GetWindowPlacement
TrackPopupMenu
ReleaseDC
SetWindowPos
GetFocus
GetKeyNameTextA
DrawIconEx
GetWindowTextA
CallWindowProcA
IsCharUpperA
IsWindowEnabled
OpenClipboard
IsWindowVisible
IsWindow
UpdateWindow
GetCapture
GetLastActivePopup
GetMenuItemInfoA
CreateMenu
GetMenuItemID
SetActiveWindow
SetMenuItemInfoA
CharUpperBuffA
wsprintfA
IsMenu
GetMenu
SetTimer
CharNextA
UnregisterClassA
FrameRect
GetClientRect
SetScrollPos
GetWindowRect
EnableScrollBar
LoadIconA
TranslateMDISysAccel
IsCharLowerA
DrawIcon
KillTimer
FindWindowA
DefFrameProcA
DrawMenuBar
GetActiveWindow
InsertMenuItemA
SetCursor
RegisterClipboardFormatA
MoveWindow
GetKeyboardLayoutList
CharLowerA
GetDesktopWindow
ReleaseCapture
SetScrollRange
SystemParametersInfoA
CreateIcon
GetMenuStringA
ImageList_GetBkColor
ImageList_Destroy
ImageList_Read
ImageList_Remove
ImageList_Add
_acmdln
wcstol
memset
mbstowcs
exit
memcpy
calloc
VirtualAlloc
SetErrorMode
GetCurrentThreadId
GetTempPathA
WideCharToMultiByte
LocalReAlloc
GlobalDeleteAtom
CreateEventA
lstrcmpA
GetModuleHandleA
FindResourceA
WriteFile
GetStartupInfoA
LoadLibraryA
LocalAlloc
SetEvent
GetLocaleInfoA
ExitProcess
GetLastError
FreeLibrary
SetEndOfFile
ReadFile
SetHandleCount
_J6_l1TnEe@24
_tDg3nBeM@4
_jHJSJr9fN3Atid@12
g0ibhEy@24
e74j6yiuztCSL
_Jncr4Cx9fN
Y5SacpWsjio@24
1XhQoxKN5NX7V
_tEnp880rrhSl5p@12
_QixijjJ9@16
_mke9UlKhR@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ