CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
a9f93f774ed631bb9dc4d63d3e1bfdf2130a3c081aa81ef626718d4c6c13e8d2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a9f93f774ed631bb9dc4d63d3e1bfdf2130a3c081aa81ef626718d4c6c13e8d2.dll
Resource
win10v2004-20220812-en
Target
a9f93f774ed631bb9dc4d63d3e1bfdf2130a3c081aa81ef626718d4c6c13e8d2
Size
62KB
MD5
74e79f4dfb3a617417be6f1164a40da1
SHA1
318ba67d94d189b3676fe90c0761c58b4748767b
SHA256
a9f93f774ed631bb9dc4d63d3e1bfdf2130a3c081aa81ef626718d4c6c13e8d2
SHA512
f906666b5e5e026cf843f1a36b41e608f864e0560b6ec6d939e484563351afceba6fdcc1fba411467ab240ccd4609ea6e2b75ec903b2bc55bb66d6ce693e55d2
SSDEEP
1536:PSwlKC19SnIhSmet3slTUsB682IBLUk8EWa/eldWqfKzR60pAcznC:HAM0GUsB68HBLEra/ej+pAd
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE