EnHookWindow
UnHookWindow
fjj4u9fdjklf
Static task
static1
Behavioral task
behavioral1
Sample
61a15e0490eb1141fb6552e306fc69e539cb8d8e0f9296c73e5451da4548a853.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
61a15e0490eb1141fb6552e306fc69e539cb8d8e0f9296c73e5451da4548a853.dll
Resource
win10v2004-20220812-en
Target
61a15e0490eb1141fb6552e306fc69e539cb8d8e0f9296c73e5451da4548a853
Size
20KB
MD5
20107f8b4fe2caf5b3b3d99475bec182
SHA1
9f610ec3498238458eca22ae81e698c38404b2c0
SHA256
61a15e0490eb1141fb6552e306fc69e539cb8d8e0f9296c73e5451da4548a853
SHA512
54efc0e5ef5829792157fc79d15a7038f300285c6ebf307097f028efac772e84939e33d142f217a59b73f6815d1feda095f75f18ac86b3676c20239e2885c500
SSDEEP
384:VoyVlNjtU2eSBImtbTwKFCUDDOxJpr7jKuxySTlezElKqk20:VdVl3zVzMHjxJlOElKPj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
EnHookWindow
UnHookWindow
fjj4u9fdjklf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ