Exucute
SetXXX
Static task
static1
Behavioral task
behavioral1
Sample
8ba822b104a66a903f86a921da73bcf3da4c4d7cbab7c873c9e145f3d49d6454.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ba822b104a66a903f86a921da73bcf3da4c4d7cbab7c873c9e145f3d49d6454.dll
Resource
win10v2004-20221111-en
Target
8ba822b104a66a903f86a921da73bcf3da4c4d7cbab7c873c9e145f3d49d6454
Size
22KB
MD5
6dae554b3df2b8b62b222cdd008fd460
SHA1
f916234a3b910e29f261de6cfe6c2a93432171da
SHA256
8ba822b104a66a903f86a921da73bcf3da4c4d7cbab7c873c9e145f3d49d6454
SHA512
a470146ca17274412873a8f92df7bc03e5d91aac9a608f054c5f239bab9608d03c9b7b7dd3d84346acbb979f38950b99b94603514e056ae867cfa16b7272aea7
SSDEEP
384:O2NVtOFNv8MEtG4868W2NuM0+eRR8w7EJbQxMR9CHomKY6:O6SNv8MUD8hANZ7EBQoCH2
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrlenA
GetProcAddress
lstrcmpA
MoveFileExA
Process32First
GetLogicalDrives
GetProcessHeap
GetSystemDirectoryA
lstrcatA
FindFirstFileA
GetLogicalDriveStringsA
GetTempFileNameA
LoadLibraryA
OpenMutexA
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
CreateMutexA
lstrcpyA
GetFileSize
SetFilePointer
HeapAlloc
GetTickCount
ReadFile
FindClose
DeviceIoControl
DeleteFileA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RtlUnwind
IsDebuggerPresent
EnumWindows
CopyIcon
FindWindowA
LoadCursorA
GetWindowThreadProcessId
wsprintfA
Exucute
SetXXX
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ