DriverProc
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
dacb5e08c7e62ab77113b0f022d9edbc984def2f31a642c0e8fccd37b4cc4d0c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dacb5e08c7e62ab77113b0f022d9edbc984def2f31a642c0e8fccd37b4cc4d0c.dll
Resource
win10v2004-20221111-en
Target
dacb5e08c7e62ab77113b0f022d9edbc984def2f31a642c0e8fccd37b4cc4d0c
Size
19KB
MD5
9092ccc1db9f50bad26ebb1eb8910352
SHA1
0bf239554b917a40eb17d2a448c8f83e1250c311
SHA256
dacb5e08c7e62ab77113b0f022d9edbc984def2f31a642c0e8fccd37b4cc4d0c
SHA512
e2d5705ffbee3d32da55c61f99dd1e0537e720e40ba175fff62d255e20f20c901d42d0c252c1ceb45e95764cccd2ca52095134449644211b7dbbea3dfba8a0bf
SSDEEP
384:9gTH47VK5KoHIhztd0iMCllyVE7cSyL0h/qNj:qTH47U5BIZt3MslCE77FEj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_adjust_fdiv
_initterm
free
fseek
strtok
fread
strcat
memcpy
fopen
??3@YAXPAX@Z
fclose
strncpy
rand
_stricmp
fmod
sscanf
mktime
strrchr
malloc
strstr
_beginthreadex
__CxxFrameHandler
atoi
sprintf
strcmp
strcpy
memset
strlen
??2@YAPAXI@Z
_getpid
CopyFileA
GetModuleFileNameA
GetPrivateProfileStringA
WritePrivateProfileStringA
ExitProcess
WaitForSingleObject
CreateThread
GetSystemDirectoryA
Sleep
GetProcAddress
LoadLibraryA
CloseHandle
GetTimeZoneInformation
MoveFileExA
GetTempFileNameA
DeleteFileA
GetFileAttributesA
VirtualProtect
GetModuleHandleA
GetPrivateProfileIntA
ToAscii
GetKeyboardState
MapVirtualKeyA
EnumWindows
GetWindowThreadProcessId
GetParent
gethostbyname
inet_ntoa
WSAStartup
WSACleanup
socket
inet_addr
htons
recv
connect
closesocket
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
DriverProc
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ