CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
2b4f5e4b1d5f62c84c4e6fee281f99e6520664bd33d9e238d1a79f1ece32d5c5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b4f5e4b1d5f62c84c4e6fee281f99e6520664bd33d9e238d1a79f1ece32d5c5.dll
Resource
win10v2004-20220812-en
Target
2b4f5e4b1d5f62c84c4e6fee281f99e6520664bd33d9e238d1a79f1ece32d5c5
Size
71KB
MD5
6e83a0b7216371fcc9e7d23097b5f853
SHA1
34df921125306631b0ce08be656bb7abbf48ea97
SHA256
2b4f5e4b1d5f62c84c4e6fee281f99e6520664bd33d9e238d1a79f1ece32d5c5
SHA512
b04c4581902d5a8eaf867a121c0bb6791fc012102a301b34a6721938385cffe16330eea60339ac2db75533ca5b5115d4e965e8631f08cfa9d5baf63f8a7122df
SSDEEP
1536:MD7jQuJl5hfTM84KXfnp/+D+Oum+KhQq/E2ZpIs7ekJ:i4qfO+ObQeEkIsV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE