ENProcess
HDDGuard
Static task
static1
Behavioral task
behavioral1
Sample
f095c68e29d501b3b12272f25a64d3253adeac1228628ee03a2e836cfaa78147.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f095c68e29d501b3b12272f25a64d3253adeac1228628ee03a2e836cfaa78147.dll
Resource
win10v2004-20220812-en
Target
f095c68e29d501b3b12272f25a64d3253adeac1228628ee03a2e836cfaa78147
Size
21KB
MD5
1d57890f2512462a5f8b505128c14d60
SHA1
a9ae457c81957204d848a37dc7ec32206c168bd5
SHA256
f095c68e29d501b3b12272f25a64d3253adeac1228628ee03a2e836cfaa78147
SHA512
cbf6c7c1fb914a74729b1a8aa3af6206aa5e337fe882f535feae3d2c980f3748594379819253dd8c51a76b2a703f5e8c06c39e2d27e648ca7419288c84c08e28
SSDEEP
384:SKQHQ/k3392RgQpx+GFGFQ273eLXVBYkkjuv1hkNLdbaLa4CwUJuUCSFCJWe8EDM:SBw/k9cDYEVBxkjuv7wbaLa4PU48IM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateThread
GetCommandLineA
GetModuleFileNameA
GetPrivateProfileStringA
lstrlenA
TerminateProcess
GetCurrentProcess
WinExec
lstrcmpA
Sleep
DeleteFileA
GlobalAlloc
lstrcatA
lstrcpyA
GetSystemDirectoryA
GetModuleHandleA
CloseHandle
ReadFile
CreateFileA
CallNextHookEx
SetWindowsHookExA
CharUpperA
CharLowerA
wsprintfA
URLDownloadToFileA
DeleteUrlCacheEntry
ENProcess
HDDGuard
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ