EnHookWindow
UnHookWindow
fjj4u9fdjklf
Static task
static1
Behavioral task
behavioral1
Sample
e68fc476a6692ff5ab43337f4e75f8de430097ab2cb9e3ca86ffdc50980210fc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e68fc476a6692ff5ab43337f4e75f8de430097ab2cb9e3ca86ffdc50980210fc.dll
Resource
win10v2004-20220812-en
Target
e68fc476a6692ff5ab43337f4e75f8de430097ab2cb9e3ca86ffdc50980210fc
Size
23KB
MD5
6b37a80da7ecfcc7723c0f3e059a2074
SHA1
6823a5a1dde664a5146c6c9c2da0f85059190a4e
SHA256
e68fc476a6692ff5ab43337f4e75f8de430097ab2cb9e3ca86ffdc50980210fc
SHA512
038686f2626f29c3c724e7e6adeeb7b90f98c082e133b0670eb3e4402530498c000c5aa13bbc811ba7f095de75392b824626fd013f2980ef434b53ac7d06a209
SSDEEP
384:RdD9d6G4LImLbjXs6110zYKub+YUTw9Aj8JEizgZB+qh1q:RCRkAHzrUES8JECgZAiU
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
EnHookWindow
UnHookWindow
fjj4u9fdjklf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ