Hookoff
Hookon
Static task
static1
Behavioral task
behavioral1
Sample
8f86213e179bcaf738418d95632cdbbc8d540ee465cdb740df9a573872219ad6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f86213e179bcaf738418d95632cdbbc8d540ee465cdb740df9a573872219ad6.dll
Resource
win10v2004-20221111-en
Target
8f86213e179bcaf738418d95632cdbbc8d540ee465cdb740df9a573872219ad6
Size
14KB
MD5
9e7a2518040cdd0157d2acdf4325f01b
SHA1
199e2972a9f15414ab7a312ea84f39538dab1976
SHA256
8f86213e179bcaf738418d95632cdbbc8d540ee465cdb740df9a573872219ad6
SHA512
b58741335988105958a39ecc6abc3242a7cadfd0056a1b7a2e29e6178589a60fd6575420856215c1043b7078bca5c9af1f9679322137da55ae02165ea792c307
SSDEEP
192:H9nYAdEA8SkvpdpSJtjIBliV4TxEaWdvZvyTLDcLPsYdJgySlZRB2l:HhSSkRdpSLH+KhqTLQjsYXgySDU
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcpyA
lstrcatA
lstrlenA
GetTickCount
lstrcpynA
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
WritePrivateProfileStringA
GetTempPathA
GetPrivateProfileStringA
GetModuleFileNameA
Sleep
GetModuleHandleA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
CreateThread
UnmapViewOfFile
OutputDebugStringA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
lstrcmpiA
ExitProcess
lstrcmpA
IsBadReadPtr
VirtualProtect
PostThreadMessageA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
Hookoff
Hookon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ