Install
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
cfcd4e53352ae442f470816b625c3b004c984333cc5759a29ddeaa9088fc8b4d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cfcd4e53352ae442f470816b625c3b004c984333cc5759a29ddeaa9088fc8b4d.dll
Resource
win10v2004-20220812-en
Target
cfcd4e53352ae442f470816b625c3b004c984333cc5759a29ddeaa9088fc8b4d
Size
32KB
MD5
67703710dc2a576f7edde9b9bdb6a583
SHA1
087bb07b7d2c718392bf3d8b115a1670629a94ed
SHA256
cfcd4e53352ae442f470816b625c3b004c984333cc5759a29ddeaa9088fc8b4d
SHA512
9e8a5d961223159e7e125aa14c60c1b8f7c2b1a5e45ea6a37de85a89e72dda38aa671aa884e5be4ced50f9c855abac212cae9cff746d8b83035ee2c968c7b7b8
SSDEEP
384:TM0oJXxjryXAeasuicTlAxAvnRQQCD2yIphh6YV0sbnpzW0oyc:TUctcZWAvn+QVphhtVfpGyc
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetComputerNameA
GetModuleFileNameA
GetFileSize
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetProcAddress
GetWindowsDirectoryA
GetModuleHandleA
LoadLibraryA
FindClose
FindFirstFileA
AddVectoredExceptionHandler
InitializeCriticalSection
IsBadReadPtr
LeaveCriticalSection
EnterCriticalSection
VirtualProtect
FlushInstructionCache
Thread32Next
SetThreadContext
GetThreadContext
OpenThread
GetCurrentProcessId
Thread32First
CreateToolhelp32Snapshot
OpenProcess
TerminateProcess
GetCurrentProcess
Sleep
GetProcessHeap
HeapAlloc
wsprintfA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
malloc
_onexit
__dllonexit
_vsnprintf
memset
sprintf
strlen
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
atoi
free
strcpy
_strcmpi
strncpy
_except_handler3
strstr
strrchr
_local_unwind2
tolower
InternetCloseHandle
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
Install
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ