COMResModuleInstance
DeleteSelf
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
wwhkf
wwhko
Static task
static1
Behavioral task
behavioral1
Sample
eae226245875597609e8d925bfa7b52c9b2af0b310fe044c7ed297f8b67f0489.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eae226245875597609e8d925bfa7b52c9b2af0b310fe044c7ed297f8b67f0489.dll
Resource
win10v2004-20220812-en
Target
eae226245875597609e8d925bfa7b52c9b2af0b310fe044c7ed297f8b67f0489
Size
19KB
MD5
6b047522d3f2ba4a3a7a0f0dd6b5d619
SHA1
a9ca7c1fc8683aa7baed4a5fa24669c46fe26ea6
SHA256
eae226245875597609e8d925bfa7b52c9b2af0b310fe044c7ed297f8b67f0489
SHA512
828f8a19162c9914ed8e146081cb12631fd370000941ac93a639acf65cb5143b8c6d5a23dcb78b925a9d3abc9f92c1a474a67641ac51b8e7b0db796e0626966d
SSDEEP
384:/JlwGBOAQ8O917xN645MyFxJqr4g4AdX0Tya9C8owo5m:/JlinxN6MMyX40O0TMJwAm
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
ReadFile
CreateFileA
DeleteFileA
GetTempPathA
lstrcpynA
CreateThread
IsBadReadPtr
GetModuleHandleA
GetModuleFileNameA
VirtualProtect
CopyFileA
GetPrivateProfileStringA
GetCurrentProcessId
GetSystemTime
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
GetTickCount
lstrcmpiA
lstrlenA
Sleep
lstrcmpA
lstrcpyA
ExitProcess
GetSystemDirectoryA
lstrcatA
LoadLibraryA
GetProcAddress
FreeLibrary
OutputDebugStringA
PostThreadMessageA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
MapVirtualKeyA
GetKeyboardState
ToAscii
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
atoi
memmove
??2@YAPAXI@Z
sprintf
strstr
COMResModuleInstance
DeleteSelf
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
wwhkf
wwhko
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ