GetDLLVer
InstallHOOK
InstallLocalHOOK
UninstallHOOK
partInit
Static task
static1
Behavioral task
behavioral1
Sample
16fe33c5321a75c9b094c7bee8a78e745174728e387ade50381578a7522b4090.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
16fe33c5321a75c9b094c7bee8a78e745174728e387ade50381578a7522b4090.dll
Resource
win10v2004-20221111-en
Target
16fe33c5321a75c9b094c7bee8a78e745174728e387ade50381578a7522b4090
Size
48KB
MD5
a85e962fee011e4199955d19c8bf8e63
SHA1
50fa65dfcee156dbd8e93fe866591ad1b566964b
SHA256
16fe33c5321a75c9b094c7bee8a78e745174728e387ade50381578a7522b4090
SHA512
d6da3ef23a8ac261aa48253b29856489aa70c41c493e6ef9aea778274eacba77f17a363e91acb40023f209f29b2f48f0825dafa5f18b603144c0fce45b44f86b
SSDEEP
384:o3amjZpLFlL5bZVGNil0u9ICOnbWOtWNu:oqehVVGklGlL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImmGetCompositionStringA
ImmGetContext
ImmReleaseContext
WriteFile
CloseHandle
CreateFileA
DeleteFileA
GetLocalTime
GetTempPathA
CreateThread
Sleep
GetCurrentProcessId
GetCurrentThreadId
LoadLibraryA
HeapFree
GetProcessHeap
InterlockedExchange
GetPrivateProfileStringA
GetPrivateProfileIntA
GetSystemDirectoryA
OutputDebugStringA
GetFileInformationByHandle
HeapAlloc
ReadFile
GetForegroundWindow
GetWindowTextA
CallNextHookEx
UnhookWindowsHookEx
GetWindowRect
_adjust_fdiv
malloc
strcpy
memset
??3@YAXPAX@Z
time
rename
rand
srand
_mkdir
_access
sprintf
memmove
abs
??2@YAPAXI@Z
memcpy
strftime
localtime
getenv
strcat
__CxxFrameHandler
strcmp
strlen
strstr
fwrite
strchr
atoi
memcmp
remove
fclose
fopen
vsprintf
printf
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
free
_initterm
_strlwr
GetDLLVer
InstallHOOK
InstallLocalHOOK
UninstallHOOK
partInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ