cadcd
rewrew
Static task
static1
Behavioral task
behavioral1
Sample
b67d2df3b5763c739bd06fb908ed1f74f3dd9e1f2ea7f0219707a104a31cdd0e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b67d2df3b5763c739bd06fb908ed1f74f3dd9e1f2ea7f0219707a104a31cdd0e.dll
Resource
win10v2004-20220812-en
Target
b67d2df3b5763c739bd06fb908ed1f74f3dd9e1f2ea7f0219707a104a31cdd0e
Size
22KB
MD5
66092a7d95e7d285bfee2d843279d9a0
SHA1
3612fa78889dfcd09ce489b42be54c0a0db9483d
SHA256
b67d2df3b5763c739bd06fb908ed1f74f3dd9e1f2ea7f0219707a104a31cdd0e
SHA512
b314a1d2db629640c3c62296eb3ba0bb305170f40fe40e134f6320b0a318208b65c3ad365ab9f1af466ba10fcbae1140e0f474f803232b2bd25533c3b6946b69
SSDEEP
384:ciL/9YfFRsFM7N5X4BDUhonpn67qA7Tyg1euk5f5XNkMr5mHRHlo0:cib9YNWFM7N5oBDU+M7qCB1eujI5GRH1
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
ExitProcess
WriteFile
VirtualProtectEx
GetPrivateProfileStringA
WideCharToMultiByte
GetTempPathA
VirtualAlloc
ReadProcessMemory
GetCurrentProcessId
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetCurrentThreadId
GetCurrentProcess
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
SetUnhandledExceptionFilter
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
_strcmpi
_stricmp
_strlwr
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strcmp
strlen
strstr
??3@YAXPAX@Z
strncpy
strchr
__CxxFrameHandler
cadcd
rewrew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ