?HookProc@@YGJHIJ@Z
InstallHook
WSAstrup
Static task
static1
Behavioral task
behavioral1
Sample
bbfd82cccf8f64affab9f1c341288f664068e56c23425d24262f803a2a350376.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bbfd82cccf8f64affab9f1c341288f664068e56c23425d24262f803a2a350376.dll
Resource
win10v2004-20221111-en
Target
bbfd82cccf8f64affab9f1c341288f664068e56c23425d24262f803a2a350376
Size
40KB
MD5
3f65dc296a6d6819fb9c6d1a4dd74ff2
SHA1
b3dc8c75c1cfbb289c0f05abdf060c8d0d789320
SHA256
bbfd82cccf8f64affab9f1c341288f664068e56c23425d24262f803a2a350376
SHA512
990b30fdfc4f80de3d609ebf358478fb84e3b15cdc458f749e0c2a26847f16ecc7324df649e795de7d6b0cd6b967f0cdc4ed986dbaf66a9a33f6d5cf1a2a494c
SSDEEP
384:UvTr5MGKSehk+KaetdLSTUgnYZTmlB6IjGWsYyWs8ZQLQl6SUX1u3g2rNvTo/CBp:UvKPJtsmTUjoGoaDQPUX1YjZvToxN8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathStripPathA
GetVersion
HeapAlloc
IsBadWritePtr
lstrcmpiA
VirtualProtect
VirtualQuery
GetVersionExA
Module32Next
OpenProcess
Module32First
CreateToolhelp32Snapshot
TerminateProcess
GetModuleHandleA
WritePrivateProfileStringA
GetProfileStringA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
Process32Next
Process32First
Sleep
CreateThread
CloseHandle
ReadProcessMemory
ExitProcess
WriteProfileStringA
GetModuleFileNameA
DisableThreadLibraryCalls
DeleteCriticalSection
FreeEnvironmentStringsA
SetHandleCount
GetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetProcAddress
RtlUnwind
GetCommandLineA
FreeEnvironmentStringsW
WideCharToMultiByte
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetOEMCP
LoadLibraryA
GetFileType
GetStartupInfoA
WriteFile
HeapFree
GetACP
GetCPInfo
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
FindWindowExA
wsprintfA
CallNextHookEx
SetWindowsHookExA
GetClassNameA
GetCursorPos
WindowFromPoint
FindWindowA
GetParent
GetWindowThreadProcessId
SendMessageA
GetFileTitleA
HttpOpenRequestA
InternetOpenA
InternetConnectA
HttpSendRequestA
InternetCloseHandle
WSAStartup
?HookProc@@YGJHIJ@Z
InstallHook
WSAstrup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ