HookProc
InstallHook
RemoveHook
Static task
static1
Behavioral task
behavioral1
Sample
b0d4058245712bd4489f0eaa0033cc3f1a15c4316c14557aac0148983b3a0129.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b0d4058245712bd4489f0eaa0033cc3f1a15c4316c14557aac0148983b3a0129.dll
Resource
win10v2004-20221111-en
Target
b0d4058245712bd4489f0eaa0033cc3f1a15c4316c14557aac0148983b3a0129
Size
30KB
MD5
8739c115d9a004d635d7d5e037450f71
SHA1
9e947392dd33cf4cb0926549a1e04e8c0ffe6191
SHA256
b0d4058245712bd4489f0eaa0033cc3f1a15c4316c14557aac0148983b3a0129
SHA512
d2206819812f51fa022b430ec5d00c8a4cc74a0ff4424a8f5ebbe9cfdcd75cfe02c30dfff71825e9794b7d2c1f28fc236ef2f72db922f77102be14ece067bf1d
SSDEEP
384:fLDO0AXcpsCGD5M9FTmcI3zmlHFLiqfyVRjdELQgNoUoXnv:fLCMpHGAFTmV+iAIELjiUoX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IsBadWritePtr
OutputDebugStringA
lstrcmpiA
VirtualProtect
VirtualQuery
GetVersionExA
GetModuleHandleA
WideCharToMultiByte
DisableThreadLibraryCalls
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
RtlUnwind
GetCommandLineA
GetVersion
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
GetStringTypeW
SetWindowsHookExA
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
UnhookWindowsHookEx
HookProc
InstallHook
RemoveHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ