GetMsgProc
InstallDll
Static task
static1
Behavioral task
behavioral1
Sample
064088f05ab277709a81266229f478bfc32b8b7f6829e2af6777263dc2424f3c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
064088f05ab277709a81266229f478bfc32b8b7f6829e2af6777263dc2424f3c.dll
Resource
win10v2004-20220812-en
Target
064088f05ab277709a81266229f478bfc32b8b7f6829e2af6777263dc2424f3c
Size
4KB
MD5
7f8113c5fb15e14011bb2982c86e4590
SHA1
514d5a92414c124de1a9fd77c668cc5d410f68b0
SHA256
064088f05ab277709a81266229f478bfc32b8b7f6829e2af6777263dc2424f3c
SHA512
7d505a576c6d61e42f24ff7685004d6587e524cfcb5f181e7591e7956ceffc07ac50345cbef4583e1a668381b6b0eaf8a31cfeb357a3ea4a99c9c0ad0bfcd8c5
SSDEEP
24:eNGSDsIMrOdUFmllesabus/AX093LRGxRCfSBF820KR:aDs7rOdUFml0NbuAH97RWAf0820K
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
StrStrA
lstrcpyA
CallNextHookEx
SendMessageA
FindWindowA
GetWindowLongA
FindWindowExA
GetWindowTextA
SetWindowsHookExA
GetMsgProc
InstallDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ