EnHookWindow
UnHookWindow
fs448547aaaa
Static task
static1
Behavioral task
behavioral1
Sample
dfb6ba38adc706420851a038f1e131effa0ef3d66615160df817817ef7654d7d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dfb6ba38adc706420851a038f1e131effa0ef3d66615160df817817ef7654d7d.dll
Resource
win10v2004-20220812-en
Target
dfb6ba38adc706420851a038f1e131effa0ef3d66615160df817817ef7654d7d
Size
23KB
MD5
9a18a186e0c7f11977422ca52430b045
SHA1
7cd73a9a209a71fea07cc0999958d47d42ab8420
SHA256
dfb6ba38adc706420851a038f1e131effa0ef3d66615160df817817ef7654d7d
SHA512
bb7509d18caab1d1234302d870fe0c63a65e66e5a0709dd7ed553b55fd17d73804149673249543be44d5d0d9831b48a263e12747f8deabbc0f8a8ac4b2f43a9e
SSDEEP
384:jPyZNjtU2mLAApkDzG7lhVd1ifJbw9Aitpjzh1LdqTy9hzxs18KTfHi:LyZiBkuHFWlwHzPLdoqxs1ZW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
EnHookWindow
UnHookWindow
fs448547aaaa
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ