InstallHook
UninstallHook
Static task
static1
Behavioral task
behavioral1
Sample
78333d169dca9b0a45b2257e9d383caccd63093ef6e5d77f9bf2e788e23bd7c7.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78333d169dca9b0a45b2257e9d383caccd63093ef6e5d77f9bf2e788e23bd7c7.dll
Resource
win10v2004-20220812-en
Target
78333d169dca9b0a45b2257e9d383caccd63093ef6e5d77f9bf2e788e23bd7c7
Size
140KB
MD5
6e5c730ae5dfdcbeeaac8be11ebd4bea
SHA1
20301c513e0f974e817d9d7d4902a670fa5b4699
SHA256
78333d169dca9b0a45b2257e9d383caccd63093ef6e5d77f9bf2e788e23bd7c7
SHA512
5dc7f751af545237039b89d680e417735cb33292aeda0becc30dd8091e9ec4a4bec959d4f43ff3f1bfb889feeb37d031da0771da88487b2b152a7228a9b14aa7
SSDEEP
3072:N3tio/VUEQgU+Dx6JlkJK9Se3cV7EaQamGhqfYe/:N3th/nX5x6JCJK9Se3cV7EgmxQe
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord3953
ord2725
ord823
ord2575
ord6055
ord1776
ord4396
ord5290
ord3402
ord3574
ord5265
ord4376
ord4853
ord4998
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord609
ord641
ord567
ord324
ord2363
ord2302
ord4234
ord4224
ord4710
ord3095
ord3089
ord3147
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord692
ord800
ord858
ord922
ord2818
ord860
ord540
ord798
ord1200
ord1997
ord4129
ord4277
ord5465
ord5194
ord533
ord3097
ord6334
ord5710
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord2370
ord2379
ord2915
ord923
ord924
ord6215
ord2086
ord2864
ord6467
ord3610
ord2587
ord4406
ord3394
ord3729
ord804
ord656
ord4299
ord3092
ord6785
ord6199
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4476
ord825
ord1116
memset
_except_handler3
memcpy
__CxxFrameHandler
strtol
atoi
_mbscmp
__dllonexit
_onexit
free
_initterm
malloc
_adjust_fdiv
??1type_info@@UAE@XZ
LocalAlloc
lstrcatA
GetModuleFileNameA
lstrlenA
lstrcpyA
OpenEventA
CreateThread
GetModuleHandleA
GetProcAddress
VirtualAlloc
ExitThread
Sleep
ExitProcess
VirtualQuery
VirtualProtect
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
LocalFree
GetForegroundWindow
SetWindowsHookExA
UnhookWindowsHookEx
IsWindowVisible
GetSystemMetrics
GetWindowRect
SetParent
CallNextHookEx
PostMessageA
MessageBoxA
MapVirtualKeyA
SetTimer
KillTimer
SendMessageA
CallWindowProcA
SetForegroundWindow
SendDlgItemMessageA
SetWindowLongA
RegisterHotKey
EnableWindow
IntersectRect
GetFocus
IsRectEmpty
FindWindowA
wsprintfA
MoveWindow
PathRemoveFileSpecA
StrToIntA
InstallHook
UninstallHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ