MainFunction
UnHook
installhook
Static task
static1
Behavioral task
behavioral1
Sample
f130365cd0227f399c00b2b5037a9d51a931f1759265e98f7b833505a67721ac.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f130365cd0227f399c00b2b5037a9d51a931f1759265e98f7b833505a67721ac.dll
Resource
win10v2004-20220812-en
Target
f130365cd0227f399c00b2b5037a9d51a931f1759265e98f7b833505a67721ac
Size
168KB
MD5
6ab24b4f8543bcfd333035be378b6452
SHA1
d4a265d03e86c66d6b24534764d72b8d885036f5
SHA256
f130365cd0227f399c00b2b5037a9d51a931f1759265e98f7b833505a67721ac
SHA512
59c00539fa6193a0a10d392327a46ea0627b622480b22b8aa0399efc3817df1f613cb0263e09335ffc40e8e5a233e4aa9f7de40055b646399fb3fd1edf8bf633
SSDEEP
3072:qR46uiChLdD4w3e0qnm+sLy1PtN+7V2az5lHAnCSXlgw7Bkv:qR46uvh+vm+gkPtNM2af1SL7Bk
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVolumeInformationA
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
GetSystemTime
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
LockResource
SizeofResource
LoadResource
FreeLibrary
FindResourceA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GetTempFileNameA
CreateDirectoryA
ExitProcess
GetModuleHandleA
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetOEMCP
DeleteFileA
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStringTypeW
GetSystemDirectoryA
GetTempPathA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetLocalTime
SetFilePointer
ReadFile
GetEnvironmentVariableA
WriteFile
OutputDebugStringA
CopyFileA
GetFileTime
MoveFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
FileTimeToSystemTime
CreateThread
GetStartupInfoA
CreateProcessA
WinExec
DeleteCriticalSection
SetFileTime
SetFileAttributesA
FileTimeToLocalFileTime
GetFileAttributesA
GetComputerNameA
GetVersionExA
GetLogicalDrives
GetDriveTypeA
GetDiskFreeSpaceExA
GetACP
FindFirstFileA
FindNextFileA
GetStringTypeA
MultiByteToWideChar
FindClose
GetFileSize
CreateFileA
CreateMutexA
GetLastError
GetVersion
InitializeCriticalSection
GetWindowsDirectoryA
CloseHandle
GetFullPathNameA
HeapSize
WideCharToMultiByte
SetUnhandledExceptionFilter
GetStdHandle
SetHandleCount
SetEndOfFile
SetStdHandle
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetCommandLineA
RaiseException
GetFileType
HeapFree
HeapAlloc
GetTimeZoneInformation
RtlUnwind
TerminateThread
EnterCriticalSection
LeaveCriticalSection
Sleep
GetCPInfo
mouse_event
GetForegroundWindow
wsprintfA
PostMessageA
SendMessageA
GetWindowLongA
GetClassNameA
GetParent
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
ToAscii
GetKeyboardState
GetKeyboardLayout
ReleaseDC
GetDC
DrawIcon
GetCursorPos
GetCursor
keybd_event
EnumChildWindows
RealizePalette
SelectPalette
GetStockObject
DeleteDC
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetObjectA
DeleteObject
GetDIBits
CloseServiceHandle
UnlockServiceDatabase
ChangeServiceConfigA
OpenServiceA
LockServiceDatabase
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
RegEnumKeyExA
RegDeleteValueA
RegSetValueA
ControlService
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
DeleteService
ShellExecuteA
StrTrimA
SHDeleteKeyA
getsockname
WSARecv
WSASocketA
WSAIoctl
WSACleanup
inet_ntoa
ntohl
gethostbyname
socket
bind
htons
htonl
closesocket
shutdown
connect
inet_addr
send
select
recv
WSAStartup
ntohs
Netbios
ImmReleaseContext
ImmGetDescriptionA
ImmGetCompositionStringA
ImmGetContext
MainFunction
UnHook
installhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ