InstallHook
UnInstallHook
Static task
static1
Behavioral task
behavioral1
Sample
ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de.dll
Resource
win10v2004-20221111-en
Target
ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de
Size
41KB
MD5
7f85a94a52a0087f8828bf91e464c85f
SHA1
97d5f958ea212e675e67013bb51d64de2fb345ee
SHA256
ea60f5c00f80a58162a51d17e74fe572d987f49ef9d5a09ff95ae97104b715de
SHA512
08d6d97ffacdc8367856d9428bc232f115abf1fb65b3f2ce77388ab94f0ffb6690116d78ac031d7fedb1da2cdf9cd518243d93d00bc12477518788255e6105bd
SSDEEP
768:YsegFYETSTEfbqRqC2o6ABvUoODB8Pk1tTMRwwA:vFBNzq96ABvsBJyRwwA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetWindowsHookExA
SendMessageA
CallNextHookEx
UnhookWindowsHookEx
LeaveCriticalSection
GetCurrentThreadId
GetCommandLineA
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
InstallHook
UnInstallHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ