CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
b612d2e81e4030fe3fc81dbd520a4492d34b4ab918b55e2444bc23b4a724fa2e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b612d2e81e4030fe3fc81dbd520a4492d34b4ab918b55e2444bc23b4a724fa2e.dll
Resource
win10v2004-20220812-en
Target
b612d2e81e4030fe3fc81dbd520a4492d34b4ab918b55e2444bc23b4a724fa2e
Size
69KB
MD5
4dcdd4a1a6d593cfd348f86ef19cc560
SHA1
4c22135e82ff62c217eae5072543b7ab19d149de
SHA256
b612d2e81e4030fe3fc81dbd520a4492d34b4ab918b55e2444bc23b4a724fa2e
SHA512
0d645abeb57b60dd158bb3f01dd1558de13762c364206a04dd2418ed3ab0a12913f40ca1d48325ccaa5b5d154e2c14536412da8e2a460fc3a5dc6d1625062834
SSDEEP
1536:5SwlKC19SnIhSm1mRDUP9rmAAp6QO2jSbt6kssDInIVwr:lAMECrmAAAOj0esDeIC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE