aRC_Hook
aRC_Unhook
Static task
static1
Behavioral task
behavioral1
Sample
e711abf50566c69c90e20459a95cbf19a3c565b520790cb4333fd9d3674eb7fc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e711abf50566c69c90e20459a95cbf19a3c565b520790cb4333fd9d3674eb7fc.dll
Resource
win10v2004-20220812-en
Target
e711abf50566c69c90e20459a95cbf19a3c565b520790cb4333fd9d3674eb7fc
Size
5KB
MD5
1ff24719c9ce3f3678e542de0577fa82
SHA1
59e6383ce511e8cccf327b30f14cae402aa97e14
SHA256
e711abf50566c69c90e20459a95cbf19a3c565b520790cb4333fd9d3674eb7fc
SHA512
6667edfb9d4b8df2e46ab295fcd4fafcc79a2ec1a692cf284800f988201f0e623d8e8eb4f09b7479b2c8b38a5adcc6bb56ee483416ada5795658bd870175c6cf
SSDEEP
96:NoKhwBKKipBbJAoqIi3YdNvqykMNoNiRZa2XtPD9m:NoYwBneS3MdNbdXtPDQ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetThreadPriority
GetCurrentThread
GetModuleHandleA
GetSystemInfo
GetProcAddress
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
VirtualQuery
lstrcmpA
GetCurrentProcess
VirtualProtect
lstrcmpiA
LoadLibraryA
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
HeapAlloc
GetProcessHeap
HeapFree
WriteProcessMemory
DisableThreadLibraryCalls
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
ImageDirectoryEntryToData
ShellExecuteA
aRC_Hook
aRC_Unhook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ