InstallHook
_WorkProc@4
__mp@4
Static task
static1
Behavioral task
behavioral1
Sample
73fdb5e8f875eca25c3e5d77773ecfe449b2b22bf1d9906171871f4275a199a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73fdb5e8f875eca25c3e5d77773ecfe449b2b22bf1d9906171871f4275a199a0.exe
Resource
win10v2004-20220812-en
Target
73fdb5e8f875eca25c3e5d77773ecfe449b2b22bf1d9906171871f4275a199a0
Size
43KB
MD5
e8cbc591fb7d229eb70087ac3d3c6772
SHA1
2fca41914f6b743ad9ef11489b8104bbaa0d7052
SHA256
73fdb5e8f875eca25c3e5d77773ecfe449b2b22bf1d9906171871f4275a199a0
SHA512
abf1759f5faf001af61b07a294fefae5b607c7c1352400838e0a367d63e1b8818822c6b9811d9d9558823156358ee70a8e5fe21be42ffd464717852dc2510528
SSDEEP
768:Kn16YFqRtJzkooG8qOVJL4MdtWIaaRbd7ShtVvheTi9dlg4jC/gPG3+U:oxFER01qayMJWhtVv6CxC/gPhU
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
UnmapViewOfFile
lstrcmpiA
HeapFree
lstrcpyA
GetLastError
HeapReAlloc
lstrlenA
InitializeCriticalSection
ExitProcess
WaitForSingleObjectEx
CloseHandle
SetEvent
OpenEventA
InterlockedIncrement
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
OutputDebugStringA
lstrcatA
GetTickCount
PulseEvent
CreateRemoteThread
MapViewOfFileEx
CreateFileMappingA
VirtualFree
VirtualAlloc
SetThreadContext
WriteProcessMemory
VirtualProtectEx
GetCurrentThreadId
ResumeThread
DuplicateHandle
OpenProcess
CreateProcessA
TerminateProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualAllocEx
VirtualFreeEx
CreateThread
DeleteFileA
SetFileTime
GetFileTime
CreateFileA
CopyFileA
Sleep
GetFileAttributesA
GetSystemDirectoryA
GetWindowsDirectoryA
CreateEventA
MapViewOfFile
RemoveDirectoryA
ExitThread
OpenFile
_lclose
TerminateThread
GetCurrentProcessId
IsBadReadPtr
lstrcpynA
LoadLibraryA
FreeLibrary
lstrcmpA
GetProcessHeap
HeapAlloc
FlushInstructionCache
VirtualProtect
SetLastError
GetThreadContext
GetCurrentProcess
TranslateMessage
DispatchMessageA
GetMessageA
MessageBoxA
wsprintfA
RegQueryValueExA
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
InitializeSecurityDescriptor
SysFreeString
SysAllocString
InternetQueryDataAvailable
InternetCrackUrlA
InternetReadFile
InternetCanonicalizeUrlA
InternetOpenUrlA
HttpQueryInfoA
InternetCloseHandle
InternetOpenA
SHDeleteKeyA
UuidToStringA
RpcStringFreeA
UuidCreate
InstallHook
_WorkProc@4
__mp@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE