COMResModuleInstance
SetMsgHook
ins
Static task
static1
Behavioral task
behavioral1
Sample
bd935ed6261a674d1ea68c900aee10aada58db59112507677e73f0043aced293.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd935ed6261a674d1ea68c900aee10aada58db59112507677e73f0043aced293.dll
Resource
win10v2004-20220812-en
Target
bd935ed6261a674d1ea68c900aee10aada58db59112507677e73f0043aced293
Size
9KB
MD5
81388efcbd5c54d1859525f72e84ba10
SHA1
c03479695e9ec6fa6c96cfaaa10615ebff1cb1ee
SHA256
bd935ed6261a674d1ea68c900aee10aada58db59112507677e73f0043aced293
SHA512
a1a557f197a8f35640236474061f9e2a65a0d363c7032c2f070028cb0d4ace87950024996efcb02270c8c5a2269a1b41157ae87d143bcee69a009447ebd80593
SSDEEP
96:HFlDbrmxzdR3wfCpK8MUy0ltKb6Ewi73rBFc0CjQh2OL9zklLrmP+CRNRJnE+HQe:HFUx46p3vEwi73dW0qZU6GP+Cb80z
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetSystemDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
DeleteFileA
GetCurrentThreadId
lstrcmpiA
WriteProcessMemory
lstrlenA
WideCharToMultiByte
lstrlenW
Module32Next
Module32First
GetWindowsDirectoryA
lstrcatA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
VirtualAllocEx
FindClose
FindNextFileA
FindFirstFileA
LoadLibraryA
CreateMutexA
ReleaseMutex
FreeLibrary
RtlZeroMemory
OpenProcess
GetLastError
GetProcAddress
ExitProcess
lstrcpyA
Sleep
GetCurrentProcessId
GetModuleFileNameA
CreateThread
CloseHandle
wsprintfA
GetMessageA
PostThreadMessageA
SetWindowsHookExA
GetWindowThreadProcessId
CallNextHookEx
UnhookWindowsHookEx
EnumWindows
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
StrStrIA
PathFileExistsA
strchr
COMResModuleInstance
SetMsgHook
ins
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ