Hook
UnHook
Static task
static1
Behavioral task
behavioral1
Sample
f30f1c50130ef64be013c99897894d4f85b5a9af7cd3188a7c7dc7fa659a3740.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f30f1c50130ef64be013c99897894d4f85b5a9af7cd3188a7c7dc7fa659a3740.dll
Resource
win10v2004-20220812-en
Target
f30f1c50130ef64be013c99897894d4f85b5a9af7cd3188a7c7dc7fa659a3740
Size
156KB
MD5
6427d2f3f3c91cf362ae60b398170f79
SHA1
3be659187a58f0854658323ad97169136c44cfc1
SHA256
f30f1c50130ef64be013c99897894d4f85b5a9af7cd3188a7c7dc7fa659a3740
SHA512
e034579f7d3c37c267b71d2fc9ef85e23139f507d6a604aed31672c2f0937eff2c99321df71a5917d19d836d551f5e9ab81ca385cdc22dfab352159b879e96f1
SSDEEP
3072:6ilhHl6LmK02u4arfF5YLsRWx0sj2glgvmnd:Rl5KU4gfwsAi+n
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetLastError
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapFree
HeapAlloc
VirtualAlloc
GetProcAddress
GetModuleHandleA
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
RtlUnwind
LoadLibraryA
GetCPInfo
GetOEMCP
HeapSize
UnhookWindowsHookEx
SetWindowsHookExA
Hook
UnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ