EnHookWindow
UnHookWindow
fjj4u9fdjklf
Static task
static1
Behavioral task
behavioral1
Sample
4e0e2b6155ded12b2d64933fa9a7ea60daf355044e6fa0e44f695dba07317ee4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e0e2b6155ded12b2d64933fa9a7ea60daf355044e6fa0e44f695dba07317ee4.dll
Resource
win10v2004-20220901-en
Target
4e0e2b6155ded12b2d64933fa9a7ea60daf355044e6fa0e44f695dba07317ee4
Size
22KB
MD5
036a9316eb824b336a441e42c15d9c7c
SHA1
28bac3857f839e4c92e70c8cfc01a950204f433d
SHA256
4e0e2b6155ded12b2d64933fa9a7ea60daf355044e6fa0e44f695dba07317ee4
SHA512
174b915244bfb6ecd64e331373717d2852eb3923ff5e235cc165c5f825e4d72aa549fc35797800551923af0f178bda49132fc60bcf51cc07623763920f51ff70
SSDEEP
384:dPyZNjtU2myYpSW7vU8a0O9pLi8ZPnwNAGjah+uSzxfQR+l6E:1yZjrWA8aT9p9ZPGaUuSxfQR+4E
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
EnHookWindow
UnHookWindow
fjj4u9fdjklf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ