Initialize
Inject
Static task
static1
Behavioral task
behavioral1
Sample
90fae4613cacf99b1b53bbb64644fb442e79f53402898d38f41318b798ed704e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90fae4613cacf99b1b53bbb64644fb442e79f53402898d38f41318b798ed704e.dll
Resource
win10v2004-20220901-en
Target
90fae4613cacf99b1b53bbb64644fb442e79f53402898d38f41318b798ed704e
Size
9KB
MD5
41f44c19e813e727303f0c9c53995abb
SHA1
6ddff62199678b32854777d9f7bd38c6836d20c9
SHA256
90fae4613cacf99b1b53bbb64644fb442e79f53402898d38f41318b798ed704e
SHA512
bcbca8d406189665c1bc5f622942ee6b267363ceab58af3344e6c64178334d1dfb559b4a783857fc2a5f95442eb0401b90dd11e8bcdd8d4055e408fdff303ff2
SSDEEP
192:uTVeO2I6KdBOE1MGNYRIOBrk9cPIuN2RCKGPXH:0UIRZQ29cmRCKGPX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord1182
_adjust_fdiv
CallNextHookEx
RegCloseKey
SysAllocStringLen
Initialize
Inject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE