FinishHook
InitHooksDll
Static task
static1
Behavioral task
behavioral1
Sample
7dc10c0db3d6280c9fb766c55c777a6abf825d5eb3212e4071e3fc2a4eb74b4b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7dc10c0db3d6280c9fb766c55c777a6abf825d5eb3212e4071e3fc2a4eb74b4b.dll
Resource
win10v2004-20220812-en
Target
7dc10c0db3d6280c9fb766c55c777a6abf825d5eb3212e4071e3fc2a4eb74b4b
Size
236KB
MD5
7d00e559b9ee1dd2e393b160cad6090c
SHA1
45b0ae4f184921698cb19062ea345e9d81d2ed73
SHA256
7dc10c0db3d6280c9fb766c55c777a6abf825d5eb3212e4071e3fc2a4eb74b4b
SHA512
6793f37f98dc03314d0d9ff378634c5f7a780f1f849518c58f03fa6d26c1318a9a88c18fe0e654d5b9262952c66503fdb9d7dcded981471599af15bdde5f7b7a
SSDEEP
6144:Wqwt+g0QPekyswLCwuSr08hKZFXZoMq3S:qh0igTx9nXMOS
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3953
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord4486
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord825
ord815
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord6375
ord2985
ord4274
ord1255
ord6467
ord1578
ord600
ord826
ord269
ord1116
__CxxFrameHandler
??2@YAPAXI@Z
__dllonexit
_onexit
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
_initterm
free
LocalFree
LocalAlloc
UnhookWindowsHookEx
CallNextHookEx
SendMessageA
SetWindowsHookExA
FinishHook
InitHooksDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE