LockMainPage
SetMyHwnd
StartHook
Static task
static1
Behavioral task
behavioral1
Sample
e1b288937c166efd722b0c48624127194c8a5a6191f008587466182df0957dcd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e1b288937c166efd722b0c48624127194c8a5a6191f008587466182df0957dcd.dll
Resource
win10v2004-20221111-en
Target
e1b288937c166efd722b0c48624127194c8a5a6191f008587466182df0957dcd
Size
120KB
MD5
b18a08a0c788d09a00173de8b6ab1560
SHA1
7b1d11e568e1978bbc99d3e998d23089c4507f07
SHA256
e1b288937c166efd722b0c48624127194c8a5a6191f008587466182df0957dcd
SHA512
3db6b876a5ff36dce49a81f15ec79a21b59d5cd3c0d821a893647e077597e3d3a0485da1ba219333a42fa52629627d43133a47274629dd86b93f3e8eb1436999
SSDEEP
1536:q3C5O7avtf0GNClXBtIo9crXCw/OOn0fWT/VX5XbNnhGgjotSmkc85:qSg7qtfrNun+XPWMt1NhMtSmg5
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
TerminateProcess
OutputDebugStringA
CreateFileA
OpenFileMappingA
CreateFileMappingA
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetCurrentProcessId
GetSystemDirectoryA
CreateToolhelp32Snapshot
Process32First
GetProcAddress
Process32Next
GetFileAttributesA
GetModuleHandleA
GetModuleFileNameA
CreateThread
WriteProcessMemory
TerminateThread
VirtualProtect
OutputDebugStringW
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSection
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadProcessMemory
LoadLibraryA
GetCurrentProcess
GetVersionExA
ExitProcess
Sleep
GetLastError
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
HeapAlloc
MultiByteToWideChar
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
GetProcessHeap
RaiseException
RtlUnwind
GetCPInfo
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
HeapSize
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
WriteFile
GetStdHandle
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetWindowTextW
SetClassLongA
GetClassLongA
SetWindowLongA
SetWindowsHookExA
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
CallNextHookEx
FindWindowExA
FindWindowA
SendMessageW
CallWindowProcW
CallWindowProcA
SendMessageTimeoutW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
LockMainPage
SetMyHwnd
StartHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ