CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
4cf3f52d3f437771102380ba0c10ea3aa251a954957f485e8bd0be8bf5008455.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4cf3f52d3f437771102380ba0c10ea3aa251a954957f485e8bd0be8bf5008455.dll
Resource
win10v2004-20220901-en
Target
4cf3f52d3f437771102380ba0c10ea3aa251a954957f485e8bd0be8bf5008455
Size
63KB
MD5
60b57e228b5d92cd9201b3ff9df62782
SHA1
aac198343ac7c7aa054449f1ea82f3a8460f2a4d
SHA256
4cf3f52d3f437771102380ba0c10ea3aa251a954957f485e8bd0be8bf5008455
SHA512
3699421939bc4006a36975e3c6ed95036c66f434fe7fa7ccf660ffe3c65af45871e477bf45dd34004134e09311671ebabf6f992c6db285bfbf809fbe1010ec67
SSDEEP
1536:BfQAl+7ovOTKgTihAzywT+DU2otLmTOsm4ajnVFY7EdVGp:dQAl+pTKawyywT+g2imqHVFYovGp
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE