AutoProc
IEKeyPrc
Static task
static1
Behavioral task
behavioral1
Sample
d2fe49182f00a13725a35ce4b5d1fc060a640c57f6f154bbaa1b98c8c8d23ea2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2fe49182f00a13725a35ce4b5d1fc060a640c57f6f154bbaa1b98c8c8d23ea2.dll
Resource
win10v2004-20220812-en
Target
d2fe49182f00a13725a35ce4b5d1fc060a640c57f6f154bbaa1b98c8c8d23ea2
Size
4KB
MD5
2da7ae81b75b33dedc25e7488ba6f4d2
SHA1
30af1664d3ebb2bdfcfc987b30d662b5bc91de48
SHA256
d2fe49182f00a13725a35ce4b5d1fc060a640c57f6f154bbaa1b98c8c8d23ea2
SHA512
a114e76240c628396c3b3e3f3ce7e0cd1f1a918110d5d305386c875bce775ba0783906c1728a9dc12633a65c06b672364f245cfdec4e190130bc4aafcbfd7edd
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SendMessageA
GetForegroundWindow
CallNextHookEx
_lclose
WinExec
lstrlenA
CloseHandle
CreateProcessA
DeleteFileA
GetModuleFileNameA
GetSystemDirectoryA
TerminateProcess
lstrcmpA
lstrcpyA
_lcreat
_llseek
_lopen
_lread
_lwrite
lstrcatA
AutoProc
IEKeyPrc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ