sdkjfuelw
sdkjfuelwDrawTextEx
sdkjfuelwEditControl
sdkjfuelwExtTextOut
sdkjfuelwGetCharacterPlacement
sdkjfuelwGetTextExtentExPoint
sdkjfuelwPSMTextOut
Static task
static1
Behavioral task
behavioral1
Sample
c81211831ea681df80334bae58fa1eadfc8f4bef2edb2f8fb186efd8655fd34e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c81211831ea681df80334bae58fa1eadfc8f4bef2edb2f8fb186efd8655fd34e.dll
Resource
win10v2004-20220901-en
Target
c81211831ea681df80334bae58fa1eadfc8f4bef2edb2f8fb186efd8655fd34e
Size
30KB
MD5
3656528c975fbe14b1485c3c7340c124
SHA1
987e0133805929eed5ff9a204fa9182d3861595a
SHA256
c81211831ea681df80334bae58fa1eadfc8f4bef2edb2f8fb186efd8655fd34e
SHA512
008ed1b878416f7fda4a48e3b891ba9989e2868c5181d61eb6786884e9d8e6a08167aadac6a4c4e8006a666f03ff4726f56a86951f95e2d53499576dadeda484
SSDEEP
192:JK7HZVTwJ1ul/RwcYsDrTtAPiQHZpCnm0aXM51AtHX5qei/:g/8J2RwQBAPnIQ814YF/
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrlenA
Module32Next
Module32First
lstrcpyA
GetWindowsDirectoryA
CreateFileA
lstrcatA
ReadFile
LocalAlloc
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
OpenProcess
VirtualProtect
VirtualProtectEx
WriteProcessMemory
CreateToolhelp32Snapshot
WritePrivateProfileStringA
IsBadStringPtrA
Sleep
GetCurrentDirectoryA
GetPrivateProfileStringA
GetCurrentProcessId
GetTempPathA
CreateThread
CloseHandle
GetWindowThreadProcessId
EnumWindows
wsprintfA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
StrStrIA
_itoa
_except_handler3
strrchr
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
strcat
strlen
strcpy
memset
memcpy
strstr
strncat
isprint
_purecall
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
sdkjfuelw
sdkjfuelwDrawTextEx
sdkjfuelwEditControl
sdkjfuelwExtTextOut
sdkjfuelwGetCharacterPlacement
sdkjfuelwGetTextExtentExPoint
sdkjfuelwPSMTextOut
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ