ooo
ppp
Static task
static1
Behavioral task
behavioral1
Sample
8ff0963dcef717c8058a8355ea9c24bbfa628ac1573f1cabe3567d0d274686dd.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8ff0963dcef717c8058a8355ea9c24bbfa628ac1573f1cabe3567d0d274686dd.dll
Resource
win10v2004-20220812-en
Target
8ff0963dcef717c8058a8355ea9c24bbfa628ac1573f1cabe3567d0d274686dd
Size
28KB
MD5
9a78546759143b3b803ba2357a41db87
SHA1
e40a2a7a5025f60b12eafdd0d67d375b71f0905d
SHA256
8ff0963dcef717c8058a8355ea9c24bbfa628ac1573f1cabe3567d0d274686dd
SHA512
5d75929c952e1c95556465c6ca9ecb4d28cbe56226d9a6cc6eb9c0b37ce90b442f9ac59c6be7c4f7b63aca109bdd8b5395c97e4a8250e067248ca9f556ed659d
SSDEEP
768:Tk+Vk8TidNr8XVmPUl6muD3jNtCqIw94EC9X:5VNhQkk3h8b9X
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DeleteFileA
CloseHandle
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
GetPrivateProfileStringA
VirtualProtect
WriteFile
TerminateProcess
GetCurrentProcess
SetFilePointer
GetModuleFileNameA
GetTickCount
ExitProcess
WideCharToMultiByte
LoadLibraryA
GetProcAddress
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
WriteProcessMemory
GetModuleHandleA
GetCurrentProcessId
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
ReadProcessMemory
CreateThread
CallNextHookEx
GetClassNameA
GetWindowThreadProcessId
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowTextA
GetForegroundWindow
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
InternetReadFile
InternetCloseHandle
PathFileExistsA
strncpy
strchr
fclose
fread
fopen
_strlwr
_strcmpi
_strupr
_stricmp
??3@YAXPAX@Z
atoi
strstr
strcmp
srand
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
ooo
ppp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ