CopyCurrentString
GetCurProcessName
StrBitRep
StrFindByte
StrGetIn
StrReplace
StrXor
Static task
static1
Behavioral task
behavioral1
Sample
d3aa3ba6c30957aa7987ecd94f4b101f2339734403714750f924bb638f1b0554.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3aa3ba6c30957aa7987ecd94f4b101f2339734403714750f924bb638f1b0554.dll
Resource
win10v2004-20220901-en
Target
d3aa3ba6c30957aa7987ecd94f4b101f2339734403714750f924bb638f1b0554
Size
23KB
MD5
ae93e74ddbc07ceb7158c50a182a4415
SHA1
def6b8a76ef68dba0d5e5038bc6effba9c5f3e5b
SHA256
d3aa3ba6c30957aa7987ecd94f4b101f2339734403714750f924bb638f1b0554
SHA512
aa77ed4d734ad0db6dcd0181fe9d8be321b63394738830ed58f3aabc5237b8a6e39c8492193da9815f7f8ebdd1e35fa6de1e1576b1ff00cf8c1d93a6299cb625
SSDEEP
384:QAD7ki25Qt3Dy2jqkXHNUGBSf4K7slszIY1+0qgJpJgLa0MppH82Y9gO:QC7kR5+tfMhsls8X0qggLa1o2Y9g
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord680
RegCloseKey
RegCreateKeyExA
RegNotifyChangeKeyValue
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
GetWindowTextA
GetParent
GetFocus
GetClassNameA
IsWindowVisible
EnumChildWindows
CharLowerBuffA
CallWindowProcA
CallNextHookEx
wsprintfA
SendMessageA
SetWindowTextA
SetWindowsHookExA
FindWindowA
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WriteProcessMemory
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
Sleep
SetFilePointer
SetFileAttributesA
CloseHandle
CreateFileA
DeleteFileA
ExitThread
GetCurrentProcess
GetFileAttributesA
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetTempPathA
GlobalFindAtomA
ReadFile
RtlMoveMemory
RtlZeroMemory
StrToIntA
StrStrIA
StrStrA
StrTrimA
CopyCurrentString
GetCurProcessName
StrBitRep
StrFindByte
StrGetIn
StrReplace
StrXor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ