Install
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
7ab2f41abdf8766bac6f8069dea4aa6b14504812ebc21b430bde6cbe0de3aefc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7ab2f41abdf8766bac6f8069dea4aa6b14504812ebc21b430bde6cbe0de3aefc.dll
Resource
win10v2004-20220901-en
Target
7ab2f41abdf8766bac6f8069dea4aa6b14504812ebc21b430bde6cbe0de3aefc
Size
32KB
MD5
8c15edbda96f6ff0df547e8160dc8f44
SHA1
4d106b06e1fb5252eecb807716cec9ae63967921
SHA256
7ab2f41abdf8766bac6f8069dea4aa6b14504812ebc21b430bde6cbe0de3aefc
SHA512
e4aa9376f84a690127a50f7d2523f2f30095f18587513df60c62733af2505ae18c6215dbcc45a736ea2f42035b7405db07d903a149bbdfa539f287044965f1d7
SSDEEP
768:rsCxl7BYvcgZ7B0jKSaXYaKuy7sFZv++09tg:Zb1GBB0jWXz9FZv++092
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetFileAttributesW
ReadProcessMemory
VirtualQueryEx
ReadFile
GetFileSize
CreateFileA
SetFilePointer
HeapAlloc
GetProcessHeap
GetWindowsDirectoryA
Sleep
GetTempPathA
GetModuleHandleA
FindClose
FindFirstFileA
GetProcAddress
FreeLibrary
DeleteFileA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
OpenProcess
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
LoadLibraryA
CallNextHookEx
GetDC
UnhookWindowsHookEx
SetWindowsHookExA
GetClassNameW
GetWindow
wsprintfA
GetWindowRect
IsTextUnicode
_strupr
_itoa
_strcmpi
free
strcpy
memset
malloc
sprintf
strlen
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
fclose
ftell
fseek
fopen
mbstowcs
strncpy
strstr
_snprintf
rand
srand
time
wcslen
wcsncat
wcscpy
wcsstr
strrchr
exit
memcpy
_except_handler3
_local_unwind2
tolower
_vsnprintf
InternetCloseHandle
DeleteDC
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
DeleteObject
Install
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ