??0CHook@@QAE@XZ
??1CHook@@UAE@XZ
??_7CHook@@6B@
?HookInstaller@CHook@@QAEPAUHHOOK__@@XZ
?HookUninstaller@CHook@@QAEHXZ
_HookProc@12
_KeyboardProc@12
Static task
static1
Behavioral task
behavioral1
Sample
76cf8c74ca0258ba8a59f57e64c3dbf1d77d783331f626c633c160896db22721.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
76cf8c74ca0258ba8a59f57e64c3dbf1d77d783331f626c633c160896db22721.dll
Resource
win10v2004-20221111-en
Target
76cf8c74ca0258ba8a59f57e64c3dbf1d77d783331f626c633c160896db22721
Size
28KB
MD5
916b18295e72859d06d53653afee0c35
SHA1
8b22fc9ebad313eddfb1942da78d83d0d6e145dd
SHA256
76cf8c74ca0258ba8a59f57e64c3dbf1d77d783331f626c633c160896db22721
SHA512
18d0d3d086e9c95775ed8697c497436e9dbf110aa2dbf3fcf3903d51d3cf1698acf9786c48ed7e5c82ee4b36695581f9a78082df2e4fa724f6f888c334940c5c
SSDEEP
96:4k3IOIT00cZElLh4Itl2qxGUqoDOvwwwniqnA7ug:iOITb4E/4ItaU3Sv1wiqA7ug
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord825
ord1168
ord1253
ord342
ord823
ord1182
ord941
ord939
ord6385
ord2915
ord800
ord858
ord2820
ord3811
ord5186
ord354
ord2764
ord860
ord540
ord537
ord1979
ord3663
ord665
ord535
_except_handler3
?terminate@@YAXXZ
free
_initterm
malloc
_adjust_fdiv
memset
sprintf
_strdup
_strlwr
__CxxFrameHandler
strlen
_strupr
_EH_prolog
MapVirtualKeyA
CallNextHookEx
GetKeyState
GetWindowTextA
GetActiveWindow
GetWindowLongA
FindWindowExA
UnhookWindowsHookEx
GetFocus
SetWindowsHookExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
??0CHook@@QAE@XZ
??1CHook@@UAE@XZ
??_7CHook@@6B@
?HookInstaller@CHook@@QAEPAUHHOOK__@@XZ
?HookUninstaller@CHook@@QAEHXZ
_HookProc@12
_KeyboardProc@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ