?Me2@@YAHKKDD@Z
?Me3@@YAHKKDD@Z
?Uneet1@@YAHKKDD@Z
?Uneet2@@YAHKKDD@Z
?Uneet@@YAHKKDD@Z
?You1@@YAHKKDD@Z
KillOld
SetHook
runform
testform
Static task
static1
Behavioral task
behavioral1
Sample
14ad16629460e300bd5512deb6c79ce997c42f5c48ecbc1df318b0720296dde4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14ad16629460e300bd5512deb6c79ce997c42f5c48ecbc1df318b0720296dde4.dll
Resource
win10v2004-20220812-en
Target
14ad16629460e300bd5512deb6c79ce997c42f5c48ecbc1df318b0720296dde4
Size
68KB
MD5
a0c27597d586d680ef6f300c8ffe69f8
SHA1
f43a4b4b1bf71697b2b43581fd8dfa2eb7d91c28
SHA256
14ad16629460e300bd5512deb6c79ce997c42f5c48ecbc1df318b0720296dde4
SHA512
ab39524960e1298c076f3576d1fd62bb42216eeb3bf8c45faa81ee3d1b2fa042f162cd7c967082629774dcf67b0e904020bab11c542ad832d8bdd2b0b3b16dbb
SSDEEP
1536:OsZf/llGuMzv7fgbeuRsODEWZ6kjUWV1WjUWV1R:OeyuMb7IbetOD3wN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetModuleHandleA
LoadLibraryA
VirtualProtect
?Me2@@YAHKKDD@Z
?Me3@@YAHKKDD@Z
?Uneet1@@YAHKKDD@Z
?Uneet2@@YAHKKDD@Z
?Uneet@@YAHKKDD@Z
?You1@@YAHKKDD@Z
KillOld
SetHook
runform
testform
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE