JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ab2c146fb98f70d447c966b16904db03cc38f5a95f5ecdc324fb57671ce3d571.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab2c146fb98f70d447c966b16904db03cc38f5a95f5ecdc324fb57671ce3d571.dll
Resource
win10v2004-20220812-en
Target
ab2c146fb98f70d447c966b16904db03cc38f5a95f5ecdc324fb57671ce3d571
Size
28KB
MD5
621776f4953e22bd6fd672699e6635d0
SHA1
e22484e654d2b7aba5d717fbd6ac9a2949df4fd8
SHA256
ab2c146fb98f70d447c966b16904db03cc38f5a95f5ecdc324fb57671ce3d571
SHA512
c8b9e64e5424c985bc77efc27d8f3375b4f3b29128888c9a4f2007c26d6d2c84c32ae6a4fbd69e9edd96db9418ac0cdac8fdfb9c35ce67f5c0f6e44c70dba6ea
SSDEEP
384:llB3ecEIy9DpFUkJLU2kG6B0lGlBU+OJOdaxVRqD:lz3ec8hvLU21G0lGlBU+OJOdaxVcD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
Sleep
ReadProcessMemory
GetProcAddress
LoadLibraryA
CreateEventA
VirtualProtectEx
GetCurrentProcess
GetCurrentProcessId
VirtualProtect
WideCharToMultiByte
MultiByteToWideChar
GlobalAlloc
CloseHandle
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
GlobalLock
GetCurrentDirectoryA
lstrlenA
WaitForSingleObject
WriteProcessMemory
SetEvent
KillTimer
wsprintfA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
PostThreadMessageA
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
send
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
_strlwr
memcmp
memset
strcpy
strcat
fclose
fputs
fopen
strcmp
memcpy
fread
strlen
__CxxFrameHandler
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_itoa
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ