Hysj
Txdrclf
Static task
static1
Behavioral task
behavioral1
Sample
fc1da56cd23b048f83e26ddf8c51d38f911e3e6b71b87a25510d2191459f388d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fc1da56cd23b048f83e26ddf8c51d38f911e3e6b71b87a25510d2191459f388d.dll
Resource
win10v2004-20220812-en
Target
fc1da56cd23b048f83e26ddf8c51d38f911e3e6b71b87a25510d2191459f388d
Size
82KB
MD5
9ad12cdfbcddcdc6a185208945424f8b
SHA1
2b29518ff9a1b2fbe1fd7abb77d80362156e781e
SHA256
fc1da56cd23b048f83e26ddf8c51d38f911e3e6b71b87a25510d2191459f388d
SHA512
440c5aada356eaaa9b58c60d8dee0b7aae3e53f56379cff18b43558cd87783030f06798408e6756e23ea972a0e60c9a503596ac0ff993efc39521e845537bc6c
SSDEEP
1536:hyRa/xNG0OBrJAG06iaZgDEbJkesG6mHardVR+MmwaW4MqGBbM5:gRaJkHAKi8gvesFd/+Te4MqGBb0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
DeleteFileA
ExitProcess
GetACP
GetCommandLineA
GetLastError
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetVersionExA
HeapAlloc
InterlockedIncrement
LoadLibraryA
RtlUnwind
SetCurrentDirectoryA
SetLastError
VirtualAlloc
WriteFile
lstrcmpiA
RegEnumKeyA
RegLoadKeyA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
InternetSetStatusCallbackA
InternetSetOptionExA
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetGetCookieA
InternetCrackUrlA
InternetConnectA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetCloseHandle
IsCharLowerA
DestroyMenu
EnableWindow
EndDialog
GetWindowTextA
LoadAcceleratorsW
MessageBoxA
OemToCharBuffA
ShowCaret
Shell_NotifyIconA
ShellExecuteW
ShellExecuteExW
ShellExecuteExA
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
SHGetDesktopFolder
SHFileOperationA
SHBindToParent
Hysj
Txdrclf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ