SetHook
UnHook
WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
df0de6af7a3519a56d0045009bda8b9e7a8286ebe1c088bbc14537742fbb145d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df0de6af7a3519a56d0045009bda8b9e7a8286ebe1c088bbc14537742fbb145d.dll
Resource
win10v2004-20220812-en
Target
df0de6af7a3519a56d0045009bda8b9e7a8286ebe1c088bbc14537742fbb145d
Size
32KB
MD5
93115ab312b212e31db33aa68b72c8b0
SHA1
8f567815e150181102d6afee055e80b4fd344c4a
SHA256
df0de6af7a3519a56d0045009bda8b9e7a8286ebe1c088bbc14537742fbb145d
SHA512
ea6b43c395bad7c9cb0c741aa1592584b75049288906ccb70d232d473dae686d7a1c4fdaacfee9fe4a5fc3d6e4cf141f607cb6ae28e074e1eaff9de7cc95b498
SSDEEP
768:mfXzv8TsBx284yM9apqz15QL3l7Uo9Q7Fn:4Xzv8sBxtqzugqQ7V
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
InternetConnectA
WSCEnumProtocols
WSCGetProviderPath
PathRemoveFileSpecA
PathFileExistsA
FindWindowA
GetDlgItemTextA
GetWindowThreadProcessId
CallNextHookEx
GetWindowLongA
UnhookWindowsHookEx
wsprintfA
wsprintfW
SetWindowsHookExA
GetSystemInfo
GetModuleHandleA
VirtualProtect
GetCurrentProcessId
GetSystemTime
lstrcpyA
IsBadReadPtr
CreateThread
LoadLibraryW
ExpandEnvironmentStringsW
LocalAlloc
LoadLibraryA
GetProcAddress
lstrcmpiA
GetLastError
lstrlenW
GetCurrentProcess
lstrcatA
ReadFile
TerminateProcess
VirtualQuery
GlobalMemoryStatus
GetModuleFileNameA
GlobalFree
MultiByteToWideChar
Sleep
GlobalAlloc
lstrlenA
WriteFile
SetFilePointer
CloseHandle
CreateFileA
RtlFillMemory
RtlMoveMemory
SetHook
UnHook
WSPStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ