CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
f20ad689fffaeea73cf973ecb440be8c1a7c13c59a340137b0fc390b8a7020af.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f20ad689fffaeea73cf973ecb440be8c1a7c13c59a340137b0fc390b8a7020af.dll
Resource
win10v2004-20220901-en
Target
f20ad689fffaeea73cf973ecb440be8c1a7c13c59a340137b0fc390b8a7020af
Size
63KB
MD5
60e9789067270dd830ed3e4ac65f30b0
SHA1
81cc244c421b6b18f9c65da8c522b56d839f3c5a
SHA256
f20ad689fffaeea73cf973ecb440be8c1a7c13c59a340137b0fc390b8a7020af
SHA512
a9a0f0bd910fb9ec943de4a60c8ca11f87f2f1d9bfe6f99ef3f149727ec688aeb6086783b32fafbf8d3e2d0c0ff9d2252ae13055327bd416cd2e9241b376c33c
SSDEEP
1536:vSwlKC19SnIhSm+gOkbqXyyIqNwqW7+KRiLl90q+2665:nAMZiNwb7MJ6q/n
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE