cadcd
rewrew
Static task
static1
Behavioral task
behavioral1
Sample
7599f0bb9d05da93763a168d6f9b0cc0a1dc09e2f2f22eed85f02d5cecd64ef8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7599f0bb9d05da93763a168d6f9b0cc0a1dc09e2f2f22eed85f02d5cecd64ef8.dll
Resource
win10v2004-20220812-en
Target
7599f0bb9d05da93763a168d6f9b0cc0a1dc09e2f2f22eed85f02d5cecd64ef8
Size
22KB
MD5
2bd2b4d02854d7b75254ed4190cec9c0
SHA1
85685212f74452f0a5a1ea2814c39a02142d84c3
SHA256
7599f0bb9d05da93763a168d6f9b0cc0a1dc09e2f2f22eed85f02d5cecd64ef8
SHA512
0e82a1d84f7bce0943302b96b0fdfa3d6863ed944951bdf883816ff7a853bff1e0fce16a0caf49271cba7f592c2ac8ead73af18471be3a42636e642958839d2c
SSDEEP
384:F4/M0+E06EqkhN1Sk4YDNho/4SwuBC11FxTkr+l5f7VdUkMr5la56Hb:FwMD6EqkhN1EYDN+quBcTkr+rI5O6Hb
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
ExitProcess
WriteFile
VirtualProtectEx
GetPrivateProfileStringA
WideCharToMultiByte
GetTempPathA
VirtualAlloc
ReadProcessMemory
GetCurrentProcessId
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetCurrentThreadId
GetCurrentProcess
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
SetUnhandledExceptionFilter
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
_strcmpi
_stricmp
_strlwr
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strcmp
strlen
strstr
??3@YAXPAX@Z
strncpy
strchr
__CxxFrameHandler
cadcd
rewrew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ