fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
b8ba90720987fc4b2a0d24765f2258f162ef533d0398cfbc78c65da26605388a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8ba90720987fc4b2a0d24765f2258f162ef533d0398cfbc78c65da26605388a.dll
Resource
win10v2004-20220812-en
Target
b8ba90720987fc4b2a0d24765f2258f162ef533d0398cfbc78c65da26605388a
Size
9KB
MD5
8ad8219bef02020522a9095743d87bdc
SHA1
36a03984a36f834c3866f0ef181a5649b1da1eed
SHA256
b8ba90720987fc4b2a0d24765f2258f162ef533d0398cfbc78c65da26605388a
SHA512
2048b3373c241a03f733f83aba325952ac79ec12b12e864d1d8242ba13fb8a61955fc1c4605176f063de69ae0f2618b46ecce51dc70f8ddc6e83338969fc2888
SSDEEP
96:TKWJyo44Qk3OEY0vXXk4ywHR2Bj161AouaMWUIJyWTqkhAtZlsWQ8:BJyH4h3OGX2wHR2Bj8Ao0WcWTqwAtbO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
WriteProcessMemory
ReadProcessMemory
ExitProcess
GetCurrentProcessId
GlobalUnlock
GlobalLock
GlobalAlloc
VirtualProtectEx
Sleep
CreateThread
GetCurrentProcess
GlobalFree
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
sprintf
_adjust_fdiv
malloc
_initterm
free
memcpy
strchr
strncpy
strrchr
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
_stricmp
strcmp
strcpy
strlen
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ