imaoe_StartHook
imaoe_StopHook
Static task
static1
Behavioral task
behavioral1
Sample
ca65ec72a794a5204a736216dc6d5d2492e8fb8783c6b5a19e734e91dc59a40a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca65ec72a794a5204a736216dc6d5d2492e8fb8783c6b5a19e734e91dc59a40a.dll
Resource
win10v2004-20220812-en
Target
ca65ec72a794a5204a736216dc6d5d2492e8fb8783c6b5a19e734e91dc59a40a
Size
48KB
MD5
42bdf849f1201daf04b1884bf3c35a60
SHA1
a2188d3a65325e415fae8c54e74c9552f7f10ee4
SHA256
ca65ec72a794a5204a736216dc6d5d2492e8fb8783c6b5a19e734e91dc59a40a
SHA512
91430886d115d65da14a4b05a985797acfd0947860623efd4985cf7fb016c494d7778a6d8cad6992c120e619ca5d30b3cc80dc9a09f19a63b7340daf93820c61
SSDEEP
768:IBDm7Lyc2WQ4zMVroiTyt6sfYIJ+9lfmL0:IBDmP3zRiTyt6sfY7l+L0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpiA
lstrcatA
LocalFree
OutputDebugStringA
LocalAlloc
FreeLibrary
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
HeapAlloc
HeapFree
RtlUnwind
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
SetWindowTextA
GetClassNameA
GetWindowTextA
SendMessageA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
GetDlgCtrlID
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
PathRemoveFileSpecA
PathAppendA
imaoe_StartHook
imaoe_StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ