??0CMACSPROHOOK@@QAE@XZ
??4CMACSPROHOOK@@QAEAAV0@ABV0@@Z
?SetupDriver@@YAXHPAUHWND__@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
cd8b5a81ed4d591e9d686ac3dfcf9b52aa90b140d1549bf936b222f96d4236f7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cd8b5a81ed4d591e9d686ac3dfcf9b52aa90b140d1549bf936b222f96d4236f7.dll
Resource
win10v2004-20221111-en
Target
cd8b5a81ed4d591e9d686ac3dfcf9b52aa90b140d1549bf936b222f96d4236f7
Size
268KB
MD5
70172f7cf7d6cba34adba0809ea72f6d
SHA1
26a0c948c855e32ffa33406fdaab2ff9b5cabcf7
SHA256
cd8b5a81ed4d591e9d686ac3dfcf9b52aa90b140d1549bf936b222f96d4236f7
SHA512
b7754e5154cf25640bfe362983c4e46ab4c7dba752846998efd08018eac9245648e4f8f99447e86694b7e2db3e7eaa40b0cb246f0ff97cabcd4b137b805b17a9
SSDEEP
6144:VhwOZz4FVD4eHoJdjhKhkVqjW+Z8MD2LNze74//F91b:Vhw5oBjhK+IbZ8MYz621b
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
RaiseException
GetCommandLineA
HeapAlloc
HeapFree
HeapSize
HeapReAlloc
ExitProcess
TerminateProcess
GetACP
LCMapStringW
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
GetOEMCP
GetCPInfo
GlobalFlags
lstrcmpA
GetProcessVersion
LoadLibraryA
FreeLibrary
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetCurrentThreadId
GetVersion
TlsGetValue
LocalReAlloc
TlsSetValue
InterlockedExchange
GlobalAlloc
GlobalReAlloc
GlobalLock
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpynA
SetLastError
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
lstrlenA
GetProcAddress
LocalFree
IsBadWritePtr
IsBadReadPtr
GetLastError
lstrcatA
CreateProcessA
OutputDebugStringA
Sleep
CloseHandle
GetModuleHandleA
GetModuleFileNameA
lstrcpyA
LCMapStringA
lstrcmpiA
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
SetFocus
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
PeekMessageA
GetParent
GetLastActivePopup
AdjustWindowRectEx
GetCapture
GetClientRect
CallNextHookEx
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
LoadStringA
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowThreadProcessId
GetSubMenu
CopyRect
wsprintfA
SetForegroundWindow
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetStockObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DocumentPropertiesA
OpenPrinterA
ClosePrinter
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
ord17
PathFindFileNameA
PathFindExtensionA
??0CMACSPROHOOK@@QAE@XZ
??4CMACSPROHOOK@@QAEAAV0@ABV0@@Z
?SetupDriver@@YAXHPAUHWND__@@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE