fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
0f615acd3313089a645d44f72b1597205b2d1331837028e38408aa0cb5909a73.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f615acd3313089a645d44f72b1597205b2d1331837028e38408aa0cb5909a73.dll
Resource
win10v2004-20220812-en
Target
0f615acd3313089a645d44f72b1597205b2d1331837028e38408aa0cb5909a73
Size
7KB
MD5
206d2da5cfc5ffd9cc2b39c881c99e40
SHA1
07adaf4a3bb2b402cbc282e6a26a98264d2a5203
SHA256
0f615acd3313089a645d44f72b1597205b2d1331837028e38408aa0cb5909a73
SHA512
63841683a05cdb0f3aa5b98e295a75547536247d86d230dbe955a78ad9cad75dc3c1c683fb803ce4e74dcbc68af58ff3008c69f74f36bcac4c6ee4d836b7f376
SSDEEP
96:HWD6PaOUzAKujhEqnflOoGhRL2lYmyaflwS5HMx:22PQzAKujnNXGLLsYmWa
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
Sleep
VirtualProtectEx
GlobalFree
ReadProcessMemory
GlobalLock
GlobalAlloc
GetCurrentProcess
GetCommandLineA
CreateThread
GetKeyboardState
UnhookWindowsHookEx
CallNextHookEx
ToAscii
SetWindowsHookExA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
_initterm
malloc
_adjust_fdiv
_stricmp
free
strlen
strstr
strncpy
??3@YAXPAX@Z
memcpy
strrchr
memset
strcpy
strcmp
strcat
sprintf
??2@YAPAXI@Z
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ