CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
a80866335768887ef1ca09891ff538a086be473e112f6f47d1ed93ccbff9954b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a80866335768887ef1ca09891ff538a086be473e112f6f47d1ed93ccbff9954b.dll
Resource
win10v2004-20220812-en
Target
a80866335768887ef1ca09891ff538a086be473e112f6f47d1ed93ccbff9954b
Size
53KB
MD5
64c0724d324786779b7bce2b72c95da0
SHA1
80a63fa26753c2f346834f1c3407d32288b5ce35
SHA256
a80866335768887ef1ca09891ff538a086be473e112f6f47d1ed93ccbff9954b
SHA512
1aa8a7ce9e19e19b589fb42ae814dea7a7e4dd8966012d11842478a4b008da96d51744165e87470d87e1e2d18e954c4fb14cfc62f254c781de8c8ff487a6a02b
SSDEEP
1536:BfQAl+7ovOAh+8+KDZxr1IFR2BCszsd7k27rwqgx:dQAl+pAhOKDZZ8wZzyw
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE