Hookoff
Hookon
Static task
static1
Behavioral task
behavioral1
Sample
7fb13859d32d7995fab9ee7fa076823b90c9c490faf1ac458cc711d8bbdc44ab.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7fb13859d32d7995fab9ee7fa076823b90c9c490faf1ac458cc711d8bbdc44ab.dll
Resource
win10v2004-20221111-en
Target
7fb13859d32d7995fab9ee7fa076823b90c9c490faf1ac458cc711d8bbdc44ab
Size
16KB
MD5
bcd4c1a6b0a0a4037a8b1a9d5fc2cae0
SHA1
a3baf1fcb87e3d8fa71793ed40403131e9c5e911
SHA256
7fb13859d32d7995fab9ee7fa076823b90c9c490faf1ac458cc711d8bbdc44ab
SHA512
d7a64c2b8af40bfb10a93092217ab0e1ff6b4b4241682a5a87a37f4c4e05f44828e0c67fd6314c4a6f0537ab899ec82902d3e604d3625015ec5f4a968e9f2723
SSDEEP
384:AaKt7KYXfF2GAPxxVpPvoHIMBsYlb5pZrsL6:12LvDA/AHIMB3F7ZrsL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcatA
ExitProcess
lstrcmpiA
lstrlenA
GetTickCount
lstrcpynA
GetSystemTime
GetPrivateProfileStringA
CloseHandle
CreateThread
lstrcpyA
CreateFileA
SetFilePointer
GetModuleFileNameA
UnmapViewOfFile
LoadLibraryA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
lstrcmpA
Sleep
VirtualProtect
ReadFile
OutputDebugStringA
RtlUnwind
PostThreadMessageA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
FindWindowA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenUrlA
shutdown
Hookoff
Hookon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ