fff
rewwc
Static task
static1
Behavioral task
behavioral1
Sample
3c923afd52350e1087eb22df140fa15df29892c685ec05b47e70eff1311466e9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c923afd52350e1087eb22df140fa15df29892c685ec05b47e70eff1311466e9.dll
Resource
win10v2004-20220812-en
Target
3c923afd52350e1087eb22df140fa15df29892c685ec05b47e70eff1311466e9
Size
40KB
MD5
811a341ed2731de047be4f75ef758cd0
SHA1
49a96c2b0254b54538daafc04405b50712ece4c3
SHA256
3c923afd52350e1087eb22df140fa15df29892c685ec05b47e70eff1311466e9
SHA512
141cf5201613bc380030397a1147e86e36a981e79159d72e10436952dda4d07c1c9df0d266c148bccd6a8c0060585c4a46232bbe1e1cc4feb952c60656bf081c
SSDEEP
768:2GjRCgcQaXcjT1S1i+4DOpp03EYbRe/wAsLB:2GjR8QakP+qsp0UY44LB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcessId
ReadProcessMemory
GetComputerNameA
ExitProcess
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
CreateMutexA
LoadLibraryA
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
VirtualAlloc
GetCurrentThreadId
GetCurrentProcess
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
EnterCriticalSection
GetProcAddress
GetDesktopWindow
GetWindow
CallNextHookEx
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
_stricmp
_strupr
_strcmpi
_strlwr
__CxxFrameHandler
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
sprintf
strcpy
strlen
strncpy
strstr
strchr
strcmp
wcslen
??3@YAXPAX@Z
fff
rewwc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ