fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
547e7122a2b73406687a92ca7969cc0b059a5e02fe2b59b8485c45210a63da3b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
547e7122a2b73406687a92ca7969cc0b059a5e02fe2b59b8485c45210a63da3b.dll
Resource
win10v2004-20220812-en
Target
547e7122a2b73406687a92ca7969cc0b059a5e02fe2b59b8485c45210a63da3b
Size
7KB
MD5
815fdc7dbd908c15977a54686d9f0b10
SHA1
d52b5a7274c2297028f31fdc1687ced0ca12eabb
SHA256
547e7122a2b73406687a92ca7969cc0b059a5e02fe2b59b8485c45210a63da3b
SHA512
ae269296a7b0be0456134f45925ecabfdf77c056655c233b5b327084c011d56892a7ec9a7bbd76b97b1dd36ab40f35e2a4a11a9e97dc530cebf60389048346f2
SSDEEP
96:VZpaZjp6hgfzaV1dS2li+QLPJuJmqkm52kB:gZ1l4PiLPAJmqDxB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
GetComputerNameA
WriteProcessMemory
ReadProcessMemory
GetCurrentProcessId
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
Sleep
GetCurrentProcess
ExitProcess
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
sprintf
_adjust_fdiv
malloc
_initterm
free
memcpy
strchr
strncpy
strrchr
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
_stricmp
strcmp
strcat
strcpy
strlen
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ