SetWinHookExA
SetWinHookExW
UnhookWinHookEx
Static task
static1
Behavioral task
behavioral1
Sample
c2adc6f1662dc212e249f30c139f03800fba7a52a378b60ed503fcea56c8d843.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2adc6f1662dc212e249f30c139f03800fba7a52a378b60ed503fcea56c8d843.dll
Resource
win10v2004-20220812-en
Target
c2adc6f1662dc212e249f30c139f03800fba7a52a378b60ed503fcea56c8d843
Size
8KB
MD5
4951d285b0c629907b8ed8da97eb87d7
SHA1
98fa618ddbc3b3b2d7eb0eda5e5883cd6ccbcf36
SHA256
c2adc6f1662dc212e249f30c139f03800fba7a52a378b60ed503fcea56c8d843
SHA512
0ca11e913a4e5298c51667cb6cbe300bfc517cef0a9737a93825105319f661989e3240170de6b1fe67f164e9e47d5d4c31d850d5680d3e7469e9c0bd46867230
SSDEEP
96:/CmHDqP6VsvOyYFYNLwZXXz+1rE1LmfzCuQ4Odi8gD0:/CsDO6S1e2Lwtk92bDdiJ0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentThreadId
VirtualAlloc
SetWindowsHookExW
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
_adjust_fdiv
malloc
free
_initterm
SetWinHookExA
SetWinHookExW
UnhookWinHookEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ