?LoadKBFilter@@YAPAUHHOOK__@@PAUHWND__@@@Z
?LowLevelKeyboardProc@@YGJHIJ@Z
?UnLoadKBFilter@@YAHPAUHHOOK__@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
466cfaa3593729bf10f2bf20c4f83831b226c9c3d4834fb0e3622ebae55f363e.dll
Resource
win7-20220901-en
Target
466cfaa3593729bf10f2bf20c4f83831b226c9c3d4834fb0e3622ebae55f363e
Size
108KB
MD5
08d8ff00ce5fcd3215d54b7a33853bf0
SHA1
b5d9e63a1cb2ec6fd8e0d4201f58cd6e542eb34d
SHA256
466cfaa3593729bf10f2bf20c4f83831b226c9c3d4834fb0e3622ebae55f363e
SHA512
8673468652724fb40e16d1d2b1e00ecee1be417813cb43a907d02bd63676853e463d8427d6c73dbdaa0aea21102e475a566233599909883a3415e60a7605faae
SSDEEP
1536:FGuT9WOroNz7nYCZoFaj1FO219DlkcYizDoLqgix+lKFkrjR4p6mAiNy:FGwrIYQoFaH79ZhzDIqvnkZmAB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SendMessageA
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
HeapFree
WriteFile
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
MultiByteToWideChar
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
?LoadKBFilter@@YAPAUHHOOK__@@PAUHWND__@@@Z
?LowLevelKeyboardProc@@YGJHIJ@Z
?UnLoadKBFilter@@YAHPAUHHOOK__@@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE