fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
dd68045ecd697b5aa7a544d545003a49d46fdf8fb0758c380a9ddc6d19e28d2b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd68045ecd697b5aa7a544d545003a49d46fdf8fb0758c380a9ddc6d19e28d2b.dll
Resource
win10v2004-20220812-en
Target
dd68045ecd697b5aa7a544d545003a49d46fdf8fb0758c380a9ddc6d19e28d2b
Size
7KB
MD5
583d4d711218aa8c89a31a1837a76e34
SHA1
093aee742e5b09f7663daa9a8c3f34b85129dbeb
SHA256
dd68045ecd697b5aa7a544d545003a49d46fdf8fb0758c380a9ddc6d19e28d2b
SHA512
8034a95d14470cf2f78f2812cc163e7a0ba90d8e552ea0b5127f4a6949234b5da1467a0aa0c0658fccbd4d24b60291877b69db06352407c753e7cd6bf2368586
SSDEEP
96:RjhWNhGKdJaw6xTqMr8QsU2LSfPfiPqb//rzhGafkNof:R+h5dwNhsCQSTNRr
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateThread
Sleep
VirtualProtectEx
MultiByteToWideChar
ReadProcessMemory
GlobalLock
GlobalAlloc
IsBadReadPtr
WideCharToMultiByte
GetCurrentProcess
GlobalFree
GetModuleFileNameA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
_adjust_fdiv
malloc
_initterm
free
_stricmp
strcmp
strrchr
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
sprintf
strlen
strncpy
strchr
strstr
fclose
fread
fopen
memset
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ