Hookoff
Hookon
Static task
static1
Behavioral task
behavioral1
Sample
bb9b4741194987550110da4185047b1bc13099a770777d81c2d470798231a299.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb9b4741194987550110da4185047b1bc13099a770777d81c2d470798231a299.dll
Resource
win10v2004-20220812-en
Target
bb9b4741194987550110da4185047b1bc13099a770777d81c2d470798231a299
Size
15KB
MD5
eae3eddeb321501022e8b68595fc1215
SHA1
042a5a41270ebe70403e3247dea2a4e1005a9d83
SHA256
bb9b4741194987550110da4185047b1bc13099a770777d81c2d470798231a299
SHA512
e9d2d0c692e7fb78bb08c06d3a3954094dc5d5ee3cc6a5620b6bfeeeb862c8141ed11874a0934c51005b40d95a5c0bb59dc043872b901e2788a3505229f236d6
SSDEEP
384:Iy43PeQ9TpHYw1t755BvcTkvahW3aySlNtGgm:mP9TlYIJHB+kdMrG1
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
IsBadReadPtr
lstrcmpA
ExitProcess
lstrcmpiA
Sleep
lstrcpyA
lstrlenA
GetTickCount
lstrcpynA
WritePrivateProfileStringA
GetTempPathA
GetPrivateProfileStringA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
CreateThread
UnmapViewOfFile
OutputDebugStringA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
Hookoff
Hookon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ