Initialize
Inject
Static task
static1
Behavioral task
behavioral1
Sample
cd5c0f74607d9883ec54d35c780961c1fe355b1a1144d0669bfe2afc08c78b67.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd5c0f74607d9883ec54d35c780961c1fe355b1a1144d0669bfe2afc08c78b67.dll
Resource
win10v2004-20220812-en
Target
cd5c0f74607d9883ec54d35c780961c1fe355b1a1144d0669bfe2afc08c78b67
Size
9KB
MD5
b0d642fc6a6230f4406c0da092576fd0
SHA1
dc3bcc559c0a292cf3fde3658356dcf96265dc0f
SHA256
cd5c0f74607d9883ec54d35c780961c1fe355b1a1144d0669bfe2afc08c78b67
SHA512
02552ca3a83e8f48159cc0892d11024f58ec6dd35b4289345a390c0dbdb65d82e70542dbed345f53d1627648386867a04d49d7a570795d998261a64343149b34
SSDEEP
96:LMbPVKI5cUPFr8kXqyayY7nCaVFOZR4mR9hwpLw6Iao/Rwk9KFH+eQIr6U9c1aPv:4TVKkcYFrhXIgaT+n5RwKGPXH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord1182
_adjust_fdiv
CallNextHookEx
RegCloseKey
SysAllocStringLen
Initialize
Inject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE