InstallHook
KeyboardProc
UninstallHook
Static task
static1
Behavioral task
behavioral1
Sample
4712a41429728bf9a0f0ce63e759d314f7b5c26c3d7206cd4a65451164669d65.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4712a41429728bf9a0f0ce63e759d314f7b5c26c3d7206cd4a65451164669d65.dll
Resource
win10v2004-20220812-en
Target
4712a41429728bf9a0f0ce63e759d314f7b5c26c3d7206cd4a65451164669d65
Size
3KB
MD5
4529518074370a7041eb0028d7a64390
SHA1
b9c9bc65167c338f98be8bbc954a450a7ff3708e
SHA256
4712a41429728bf9a0f0ce63e759d314f7b5c26c3d7206cd4a65451164669d65
SHA512
3070a2ad2e6533870bfd84e525f332f9d3e9fa373f9d05b3818d49102303bd1403d23b3c15a6f4cf3a8b0ad9df6134cb2b2925fb7d356824f1c86a95c7991e4e
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetLastError
CallNextHookEx
GetKeyboardState
PostMessageA
SetWindowsHookExA
ToAscii
UnhookWindowsHookEx
InstallHook
KeyboardProc
UninstallHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ