StartHook
StopHook
Static task
static1
Behavioral task
behavioral1
Sample
d47f4170fc583748be6afaa7da36914e0c5e8f40e761b2acbe177a7d655b54f9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d47f4170fc583748be6afaa7da36914e0c5e8f40e761b2acbe177a7d655b54f9.dll
Resource
win10v2004-20220812-en
Target
d47f4170fc583748be6afaa7da36914e0c5e8f40e761b2acbe177a7d655b54f9
Size
24KB
MD5
6bc714e776d1a3c3d08163ab99089b84
SHA1
476f55d60d448c2266d9f963c9997e972b882fc0
SHA256
d47f4170fc583748be6afaa7da36914e0c5e8f40e761b2acbe177a7d655b54f9
SHA512
c95a4c8389ba3b3265f3fd67c592aa32d21cf87935a98a56bb2d2230497359828f1d783bb7258165b2bcab53a6b55034a0f2ff73da616588e3958350d843c0ac
SSDEEP
384:iG0aM577j2qMLDFhn0HT9dnSBbDEEkFFhCIFsIWbQw8BoervMc78L8P93beb11c+:A0qopd0HxdkDpIKqGv8BvSLeVbehh
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
GetKeyboardType
RegQueryValueExA
SysFreeString
StartHook
StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE