Hookoff
Hookon
Static task
static1
Behavioral task
behavioral1
Sample
2ef6be89c375800e564dcb852003bb757705753265f970ba6668563b2f61fcd7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ef6be89c375800e564dcb852003bb757705753265f970ba6668563b2f61fcd7.dll
Resource
win10v2004-20220901-en
Target
2ef6be89c375800e564dcb852003bb757705753265f970ba6668563b2f61fcd7
Size
16KB
MD5
a27ac02ee35a95daa7709d5abbdc3130
SHA1
4aa4a36cf81d8c390493e3393ac43b0be7e19f1c
SHA256
2ef6be89c375800e564dcb852003bb757705753265f970ba6668563b2f61fcd7
SHA512
0d4a23379c1e1b669ed3cade32239ad4755974ba1763210667e98750ef31d5d81a463d52ee586d48044ac663c15408174539311caa7f49225c9709f656699183
SSDEEP
192:Eu1EbSNnU/liP5FoksLdifvMoWS8Dezk799zKXt9NblQaqMgQBaFS8lb5kUZz49s:IWNn6Y8k/Mo26Ahetz1clb5pZM9phpy
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcatA
ExitProcess
lstrcmpiA
lstrlenA
GetTickCount
lstrcpynA
GetSystemTime
GetPrivateProfileStringA
CloseHandle
CreateThread
lstrcpyA
CreateFileA
SetFilePointer
GetModuleFileNameA
UnmapViewOfFile
LoadLibraryA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
lstrcmpA
Sleep
VirtualProtect
ReadFile
OutputDebugStringA
RtlUnwind
PostThreadMessageA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
FindWindowA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenUrlA
shutdown
Hookoff
Hookon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ