MHook
MUnHook
Static task
static1
Behavioral task
behavioral1
Sample
e7ffd03b1ac5a2d815f94d7a977c373a075d895b909c676cd3d683a7144ef8d9.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7ffd03b1ac5a2d815f94d7a977c373a075d895b909c676cd3d683a7144ef8d9.dll
Resource
win10v2004-20220812-en
Target
e7ffd03b1ac5a2d815f94d7a977c373a075d895b909c676cd3d683a7144ef8d9
Size
24KB
MD5
ff5075074056a6706718ae927cb56040
SHA1
2425364b87731340001a908f40e674b9a7c2fce2
SHA256
e7ffd03b1ac5a2d815f94d7a977c373a075d895b909c676cd3d683a7144ef8d9
SHA512
1462f28bdd7148b9288e067ffd25dd139d808147f0fa06a289cf5b32096c035a79716bd974eeefa51cee629633851bd4e76e0da28a3c4c66d77337428dc73d6d
SSDEEP
96:nPVNxExOCIkotsOkk5LCYIoxUusGAKHxc4uR:nxCIVXR5IoxRimVuR
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
FindWindowExA
UnhookWindowsHookEx
GetWindowTextA
CallNextHookEx
GetActiveWindow
SetWindowsHookExA
GetWindowsDirectoryA
GetProcAddress
CloseHandle
WriteFile
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
VirtualProtect
GetModuleHandleA
SetFilePointer
LoadLibraryA
CreateFileA
InternetReadFile
StrStrA
MHook
MUnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ