HookOff
HookOn
Static task
static1
Behavioral task
behavioral1
Sample
d4c4e1305679f2bf6c15a58b957541ca5ae6c4bd95798ea93b04d8de37f119a7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4c4e1305679f2bf6c15a58b957541ca5ae6c4bd95798ea93b04d8de37f119a7.dll
Resource
win10v2004-20220812-en
Target
d4c4e1305679f2bf6c15a58b957541ca5ae6c4bd95798ea93b04d8de37f119a7
Size
304KB
MD5
49d3f4c8982c5ac1c9dc42a31b8b8413
SHA1
829c5d68c9617a0a3f84ff4d1bb42b733b24e10c
SHA256
d4c4e1305679f2bf6c15a58b957541ca5ae6c4bd95798ea93b04d8de37f119a7
SHA512
ea710234172f1906caad61319f4a41c359834507e2514412e15a050412e5efee2348b74183ebd85ba0b37b7a985b5ad7224ebc6f10f7ce8ed06dffe343474625
SSDEEP
6144:8WMrGvO9w1Fph4/cjJ0es4Q2KpwR5NiqHuw4eq:BzvOW1/9JE4QVUjiy7q
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
HookOff
HookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE