Hookoff
Hookon
Static task
static1
Behavioral task
behavioral1
Sample
b7f86182e0c4d1a124d2a84522505090e9c2c9d4cf2727dab0e03e74313a6465.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b7f86182e0c4d1a124d2a84522505090e9c2c9d4cf2727dab0e03e74313a6465.dll
Resource
win10v2004-20220812-en
Target
b7f86182e0c4d1a124d2a84522505090e9c2c9d4cf2727dab0e03e74313a6465
Size
14KB
MD5
1b7c512782cf44c750b898feb83ca901
SHA1
182f6f145b0641df8a171289e00c1d164cfda452
SHA256
b7f86182e0c4d1a124d2a84522505090e9c2c9d4cf2727dab0e03e74313a6465
SHA512
01da5774c8d0d7668385cae4994f69f4c61ce1f5f891f7472295df2d11ff9dbc3d954a8e32a88b4e9d7bc232413b8690c32c4e084dd72417ca6588be7f78130a
SSDEEP
384:h3Ji7IgwFV9kUKDKuBEcWWzrc6KloE20SPvjZ:XmfCV9j6fByiKt0F
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
lstrcmpA
lstrcmpiA
Sleep
lstrcpyA
ExitProcess
lstrlenA
GetTickCount
lstrcpynA
GetCommandLineA
WritePrivateProfileStringA
GetTempPathA
GetPrivateProfileStringA
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
CreateThread
UnmapViewOfFile
OutputDebugStringA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
GetModuleFileNameA
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
Hookoff
Hookon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ