Hook
Unhook
Static task
static1
Behavioral task
behavioral1
Sample
8dc2bb0c900c09495e6fee906250c86c245870bc5878ed97d24be0d2f6c57b34.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8dc2bb0c900c09495e6fee906250c86c245870bc5878ed97d24be0d2f6c57b34.dll
Resource
win10v2004-20220812-en
Target
8dc2bb0c900c09495e6fee906250c86c245870bc5878ed97d24be0d2f6c57b34
Size
24KB
MD5
368ec47b58a267934f7fb76546201801
SHA1
c9988ad5df762ec897613dcf21558072390da37f
SHA256
8dc2bb0c900c09495e6fee906250c86c245870bc5878ed97d24be0d2f6c57b34
SHA512
2d739e6a29e544cf41640718bd68661748995751b322979d60f524dd1c1544fde0d51869363a16d56c69e7cd58d2dd740c94ac50b4912a82599d5c3a854deceb
SSDEEP
96:hg3j01ojeP8M2/zne0XnakNQbvzu3yINHsApBfQhXF6CzT:hSj01oS8trAkNiz5/KQhlP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentThread
GetModuleHandleA
GetSystemInfo
GetProcAddress
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
SetThreadPriority
WriteProcessMemory
GetCurrentProcess
VirtualProtect
lstrcmpiA
LoadLibraryA
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
VirtualQuery
DisableThreadLibraryCalls
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
ImageDirectoryEntryToData
__CxxFrameHandler
_adjust_fdiv
malloc
_initterm
_except_handler3
??3@YAXPAX@Z
??2@YAPAXI@Z
__dllonexit
_onexit
free
Hook
Unhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ