start
stop
Static task
static1
Behavioral task
behavioral1
Sample
c1ee52443eb60841c26f2f7fc34c115e9180e97164793367e918f4309899843e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1ee52443eb60841c26f2f7fc34c115e9180e97164793367e918f4309899843e.dll
Resource
win10v2004-20220901-en
Target
c1ee52443eb60841c26f2f7fc34c115e9180e97164793367e918f4309899843e
Size
5KB
MD5
9323812f6ab8ca241077c1c814d7e17e
SHA1
c6257788d4b8a484ac351e47792b25d3e375d4fe
SHA256
c1ee52443eb60841c26f2f7fc34c115e9180e97164793367e918f4309899843e
SHA512
920a53266a83d0e1e3a654f2f5fd53f7d3423ef71f5ab3536ac0b79b4c742d58a99dc7ff8d21de0a4dd7140057b1e8178e6012ddb2d40817e65fdfcfdc9f4924
SSDEEP
96:UnxMOMHD4T1hSx4dKaYMNmUmHQxuaVRRSbziK:YxaD4T104dhyoEn
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImageDirectoryEntryToData
CallNextHookEx
SetWindowsHookExW
UnhookWindowsHookEx
GetCurrentProcess
WriteProcessMemory
GetCurrentProcessId
CloseHandle
Module32NextW
CreateToolhelp32Snapshot
HeapAlloc
HeapFree
GetCurrentThread
GetProcessHeap
SetThreadPriority
DisableThreadLibraryCalls
lstrcmpiW
VirtualQuery
LoadLibraryExW
LoadLibraryW
lstrcmpiA
GetProcAddress
LoadLibraryA
Module32FirstW
GetSystemInfo
GetModuleHandleA
LoadLibraryExA
VirtualProtect
start
stop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ