erc
fcsec
Static task
static1
Behavioral task
behavioral1
Sample
b01cc1726adb557a5dfde8389f75844b04169de689360021b50e35153abb8d72.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b01cc1726adb557a5dfde8389f75844b04169de689360021b50e35153abb8d72.dll
Resource
win10v2004-20220812-en
Target
b01cc1726adb557a5dfde8389f75844b04169de689360021b50e35153abb8d72
Size
25KB
MD5
57ab63d044cbaa25df5004929f94774c
SHA1
2a74ebdbeb638046701b36d55074dc5d0574944d
SHA256
b01cc1726adb557a5dfde8389f75844b04169de689360021b50e35153abb8d72
SHA512
6d75015538f6acc337cc740d36344d6902e442e23272254bc2d411ee11ed0e8ab9a374cabdc3b79d95a5d02421c83ad1b07a0fef5dde2f8dd997cc9769f12524
SSDEEP
384:efF2uhQ0zQWEkh3ss87nLbGCDtjz2LNl+wcZCbE26pS8/OR0ilOaOJQ:GF2utQ7g87Lb5DJz2Nlfev2JR0iQ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
GetModuleHandleA
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
ReadProcessMemory
SetUnhandledExceptionFilter
GetCurrentProcessId
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
CreateMutexA
GetLastError
ExitProcess
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
SetThreadContext
CreateThread
SetWindowsHookExA
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
GetWindowTextA
_strupr
_stricmp
_strcmpi
_strlwr
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strcmp
wcslen
strlen
strstr
??3@YAXPAX@Z
strncpy
strchr
__CxxFrameHandler
erc
fcsec
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ