COMResModuleInstance
LpkPSMTextOut
LpkUseGDIWidthCache
SetMsgHook
ftsWordBreak
ins
Static task
static1
Behavioral task
behavioral1
Sample
dd33764bd8be39fabc48e859590709d9c1cd43cecbccd6458d29926d59ae6eb0.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd33764bd8be39fabc48e859590709d9c1cd43cecbccd6458d29926d59ae6eb0.dll
Resource
win10v2004-20220812-en
Target
dd33764bd8be39fabc48e859590709d9c1cd43cecbccd6458d29926d59ae6eb0
Size
158KB
MD5
c7aed48b50d3098483406964b4b4706d
SHA1
5d38fc7e057be088eaf758492dc17d0d0f70d43b
SHA256
dd33764bd8be39fabc48e859590709d9c1cd43cecbccd6458d29926d59ae6eb0
SHA512
6ea148d8a5143e4aa93383bae2a3c76760e7871093191d5380e6514d71be181eab00929598a5b620169de5f998c0a2bcd98e4806c4d6185927d17f509d6ab0df
SSDEEP
96:l0v2EURbz3d5s97LWip2ZjeP5jBXYM+zhOiMYvebXtYW/uNs7Q5+REQLn9uMZu3:6v2EURM2d4VBYThOWvebeh5tY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Process32First
CreateToolhelp32Snapshot
WriteProcessMemory
WideCharToMultiByte
lstrlenA
lstrlenW
Module32Next
Module32First
GetWindowsDirectoryA
lstrcmpiA
lstrcatA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
VirtualAllocEx
FindClose
FindNextFileA
FindFirstFileA
Process32Next
FreeLibrary
GetCurrentThreadId
DeleteFileA
OpenEventA
SetEvent
LoadLibraryA
CreateMutexA
ReleaseMutex
RtlZeroMemory
OpenProcess
GetLastError
RtlFillMemory
lstrcpyA
GetCurrentProcessId
Sleep
GetModuleFileNameA
CreateThread
CloseHandle
GetMessageA
PostThreadMessageA
GetWindowThreadProcessId
UnhookWindowsHookEx
EnumWindows
SetWindowsHookExA
wsprintfA
CallNextHookEx
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
PathFileExistsA
StrStrIA
strrchr
strcpy
strcmp
strcat
COMResModuleInstance
LpkPSMTextOut
LpkUseGDIWidthCache
SetMsgHook
ftsWordBreak
ins
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ