?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
cf31fcfda2a7360b11f36d61b6b734a90f061aa48011671a86c04897a9012e8a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf31fcfda2a7360b11f36d61b6b734a90f061aa48011671a86c04897a9012e8a.dll
Resource
win10v2004-20220812-en
Target
cf31fcfda2a7360b11f36d61b6b734a90f061aa48011671a86c04897a9012e8a
Size
36KB
MD5
b158ace97df476e8be4e5a272304fe19
SHA1
6ccffcd8e10d815235c99229f5dbc046c91bbab6
SHA256
cf31fcfda2a7360b11f36d61b6b734a90f061aa48011671a86c04897a9012e8a
SHA512
f939c6c3f18143da5b6851ad917ce7f1fbc153d87dd9c3cfacffa31ad554a8c0abe1fe2bf52d2f8408e7ecb0adbcc89f66ce041ba2fd6a331ccfc8a863070f89
SSDEEP
384:TH/WJJ3N4IrgDsAcYkyJgBLpGaONCWg3LJnVY:TOJZN4vwAcYHGBtG387w
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
gethostbyname
ord4274
_adjust_fdiv
SetWindowsHookExA
CoInitialize
SysFreeString
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE