UnHookkb
installhook
installhook1
Static task
static1
Behavioral task
behavioral1
Sample
7dfd9fc79247fe79b4e3105b9b7deaabdf5e3a843bd630f18323e6d04177d492.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7dfd9fc79247fe79b4e3105b9b7deaabdf5e3a843bd630f18323e6d04177d492.dll
Resource
win10v2004-20220812-en
Target
7dfd9fc79247fe79b4e3105b9b7deaabdf5e3a843bd630f18323e6d04177d492
Size
48KB
MD5
ab16bc3ff27694084fa0308767f91a11
SHA1
06b11d9ed632e5cff001fba85e0f376481b51bca
SHA256
7dfd9fc79247fe79b4e3105b9b7deaabdf5e3a843bd630f18323e6d04177d492
SHA512
6f3937d878de3d5215708f3a1d26b5f949ebde051e8cb2603a1b779f8a8827699beb87b0003eb9c94411ba5397130ba104fe2fbdfaf86d6f68bf8ab58c4d9932
SSDEEP
768:h3SG+M0TMz8ntBiTp/MMCodBcxoc7pg7YRl:l0TY8ntBWWMCEPctg7Gl
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WriteFile
GetSystemDirectoryA
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
lstrcatA
SetFilePointer
CloseHandle
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
RtlUnwind
SetWindowsHookExA
UnhookWindowsHookEx
ToAscii
CallNextHookEx
GetKeyboardState
UnHookkb
installhook
installhook1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ