COMResModuleInstance
LpkPSMTextOut
LpkUseGDIWidthCache
SetMsgHook
ftsWordBreak
ins
Static task
static1
Behavioral task
behavioral1
Sample
8814bff087220e895b17518eb7556a05282969cd1e8dfc8102bb7c9afa01b7f2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8814bff087220e895b17518eb7556a05282969cd1e8dfc8102bb7c9afa01b7f2.dll
Resource
win10v2004-20220812-en
Target
8814bff087220e895b17518eb7556a05282969cd1e8dfc8102bb7c9afa01b7f2
Size
11KB
MD5
a9fa165c64130a590786c65b2e30e9a1
SHA1
0f0ed00742cf727c76aa9d31128d1dcfd4d18335
SHA256
8814bff087220e895b17518eb7556a05282969cd1e8dfc8102bb7c9afa01b7f2
SHA512
29c48b3c46b37e019280693622f73893d90f64032682cf08e13f8d4cbcc40664fd3c98843b9870acff97b44713f4352d20e1cfc55ae293619362b648e2d70c8b
SSDEEP
192:dIIXvw2aMqmTTDRgNmYuHhaRu09gXvcvebeh5tCd:KI/wyTXfNv0+/cvebizCd
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Process32First
CreateToolhelp32Snapshot
WriteProcessMemory
WideCharToMultiByte
lstrlenA
lstrlenW
Module32Next
Module32First
GetWindowsDirectoryA
lstrcmpiA
lstrcatA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
VirtualAllocEx
FindClose
FindNextFileA
FindFirstFileA
Process32Next
FreeLibrary
GetCurrentThreadId
DeleteFileA
OpenEventA
SetEvent
LoadLibraryA
CreateMutexA
ReleaseMutex
RtlZeroMemory
OpenProcess
GetLastError
RtlFillMemory
lstrcpyA
GetCurrentProcessId
Sleep
GetModuleFileNameA
CreateThread
CloseHandle
GetMessageA
PostThreadMessageA
GetWindowThreadProcessId
UnhookWindowsHookEx
EnumWindows
SetWindowsHookExA
wsprintfA
CallNextHookEx
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
PathFileExistsA
StrStrIA
strrchr
strcpy
strcmp
strcat
COMResModuleInstance
LpkPSMTextOut
LpkUseGDIWidthCache
SetMsgHook
ftsWordBreak
ins
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ