DebugBreakpoint
DebugInit
Init
InitService
SpawnedInit
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
ed44a67ccdca6641db710b4a283906553dfa99c1d9ff2833a9a39743d385e76b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ed44a67ccdca6641db710b4a283906553dfa99c1d9ff2833a9a39743d385e76b.dll
Resource
win10v2004-20220812-en
Target
ed44a67ccdca6641db710b4a283906553dfa99c1d9ff2833a9a39743d385e76b
Size
147KB
MD5
84be81ef8d96e51aa982619bfcdb11d5
SHA1
ff69ea6cdb5f13b39bf098653618aa035feada82
SHA256
ed44a67ccdca6641db710b4a283906553dfa99c1d9ff2833a9a39743d385e76b
SHA512
b2d3eb98ea0a63654598bb719d93dae04461c0852be75606174c48aca6c8917a7bcb894fd704ec9ea2c785867d9a0db28d09271a7013ad14fcd7c57d07c537cd
SSDEEP
3072:NA77irbKZVCx8CTg046hFdO9Kbnc4rxntiztFW3O:NO7irbKZEx3Z/dYiRtUo+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
GetUserNameA
CloseHandle
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateProcessA
CreateThread
DeleteFileA
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetSystemTime
GetTempPathA
GetTickCount
GetVersion
GetVolumeInformationA
GlobalLock
GlobalUnlock
IsBadReadPtr
LoadLibraryA
MapViewOfFile
OpenEventA
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
Sleep
SystemTimeToFileTime
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WriteFile
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
GetEnvironmentVariableA
GetLocalTime
GetLocaleInfoA
GetTimeZoneInformation
GetWindowsDirectoryA
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetCurrentProcess
GetDiskFreeSpaceA
GetDriveTypeA
GetFileTime
GetLogicalDrives
SetFileTime
CreatePipe
DuplicateHandle
GetExitCodeProcess
PeekNamedPipe
TerminateProcess
TerminateThread
FormatMessageA
GetFileType
GetPrivateProfileSectionA
MoveFileA
VirtualAlloc
VirtualFree
WritePrivateProfileSectionA
getsockname
shutdown
send
recv
listen
inet_ntoa
connect
bind
WSAAsyncSelect
gethostname
inet_addr
ioctlsocket
closesocket
accept
WSAStartup
WSAGetLastError
WSACleanup
WSACancelAsyncRequest
WSAAsyncGetHostByName
WSAAsyncGetHostByAddr
socket
OemToCharBuffA
CharToOemBuffA
ExitWindowsEx
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
ShowWindow
SetWindowsHookExA
SendMessageA
RegisterClassA
PostThreadMessageA
PostMessageA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxA
IsClipboardFormatAvailable
GetWindowThreadProcessId
GetWindowTextA
CallNextHookEx
CloseClipboard
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnumWindows
FindWindowA
GetActiveWindow
GetClassNameA
GetClipboardData
GetMessageTime
GetParent
ShellExecuteA
DebugBreakpoint
DebugInit
Init
InitService
SpawnedInit
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ