CommProc
Entry
Static task
static1
Behavioral task
behavioral1
Sample
c4ea33be9025500bffef987769e7bd867348ffe694f6677770ac5fc755f7282b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4ea33be9025500bffef987769e7bd867348ffe694f6677770ac5fc755f7282b.dll
Resource
win10v2004-20220812-en
Target
c4ea33be9025500bffef987769e7bd867348ffe694f6677770ac5fc755f7282b
Size
273KB
MD5
655c0a8287ca2163c8f90f55adaf5510
SHA1
87488e910e08dc789bf82904bc5b404cdcb1c010
SHA256
c4ea33be9025500bffef987769e7bd867348ffe694f6677770ac5fc755f7282b
SHA512
48e3ca0ab75cd2fd2d95083a94b6e3a8c9779df056ce093f49fa55338cdce3687bfd8109b7bd187e81f79c7fe5fa652851daa4a492b9044806d9786471c794a9
SSDEEP
6144:sWHWyivQInfxsM/Tx1p3qnGz9hA4sB4tJLBmjv9TBECSzD3:h2yOp9S4xtJLBmjv9T
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetLastError
VirtualAllocEx
LoadLibraryA
GetProcessId
CloseHandle
WriteProcessMemory
GetCurrentProcess
CopyFileA
GetModuleFileNameA
OpenMutexA
CreateMutexA
FormatMessageA
ReadProcessMemory
GetProcAddress
VirtualFreeEx
OutputDebugStringA
CreateFileA
GetTimeFormatA
GetDateFormatA
GetExitCodeProcess
CreateProcessA
FileTimeToSystemTime
ExitThread
FreeLibraryAndExitThread
GetCurrentDirectoryA
WinExec
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
HeapSize
OpenProcess
CreateRemoteThread
lstrcpyA
CreateThread
DeleteFileA
FindNextFileA
GetExitCodeThread
VirtualAlloc
FindClose
FindFirstFileA
lstrcatA
GetFileAttributesA
Sleep
VirtualFree
GetTickCount
WaitForSingleObject
GetStringTypeW
CreateFileW
WriteConsoleW
IsProcessorFeaturePresent
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
LoadLibraryW
FlushFileBuffers
LCMapStringW
SetLastError
TlsFree
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
DecodePointer
HeapReAlloc
RtlUnwind
GetCurrentThreadId
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
EncodePointer
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
ReadFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
SetFilePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
GetDC
ReleaseDC
GetDesktopWindow
GetCursorPos
GetSystemMetrics
OemToCharA
BitBlt
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
GetBitmapBits
RegOpenKeyExA
RegCreateKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
RegCloseKey
SHCreateDirectoryExA
ord680
GetUserProfileDirectoryA
GetAllUsersProfileDirectoryA
GetProcessImageFileNameA
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
send
gethostbyname
closesocket
recv
htons
connect
shutdown
socket
WSAStartup
CommProc
Entry
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ