DriverProc
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
32fbcc1eb23951b427922627074e1d9daa3887dc81bb39ae6a2d64962c091a26.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32fbcc1eb23951b427922627074e1d9daa3887dc81bb39ae6a2d64962c091a26.dll
Resource
win10v2004-20221111-en
Target
32fbcc1eb23951b427922627074e1d9daa3887dc81bb39ae6a2d64962c091a26
Size
18KB
MD5
c48a28d216c99016ee057c8b4050c9a0
SHA1
e918d8c4c61ef1db7e4e3b2126e6905f01832798
SHA256
32fbcc1eb23951b427922627074e1d9daa3887dc81bb39ae6a2d64962c091a26
SHA512
184c539d6a13e9482baf35d55e9223ee4fe027e07465bfd1c2a5f6bad8f2d8d57fa9c4afb38b2f96f17f3d665a8de06430b4c55af3b7ab7c258bbfd8d9e38334
SSDEEP
384:93CiGC+GoC37M6F0yWqYkD68PqR+zCru60vivm:9SiO27MUWXkvqR++ruXv+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WriteFile
GetTempPathA
GetLocalTime
GetCPInfoExA
GetACP
TerminateThread
CreateProcessA
CreateThread
GetModuleFileNameA
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
CreateFileA
GetLastError
CloseHandle
GetSystemDirectoryA
DeleteFileA
Sleep
LoadLibraryA
SetThreadPriority
GetProcAddress
GetCursor
GetDC
InternetReadFile
InternetOpenA
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
GetPixel
GetBkMode
OpenSCManagerA
DeleteService
CloseServiceHandle
ControlService
OpenServiceA
ShellExecuteExA
_except_handler3
memset
strcat
strcpy
sprintf
strrchr
strlen
memcpy
DriverProc
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ