CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
42de6d27614b266ec006ebbaf62a19b3cbf6f42bec3a425adace28626226f2f9.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
42de6d27614b266ec006ebbaf62a19b3cbf6f42bec3a425adace28626226f2f9.dll
Resource
win10v2004-20220901-en
Target
42de6d27614b266ec006ebbaf62a19b3cbf6f42bec3a425adace28626226f2f9
Size
80KB
MD5
6b8fa770661e1badee4dffc700b80e10
SHA1
1ec80d218bbc81d358fdc1412cccc99ac4d35759
SHA256
42de6d27614b266ec006ebbaf62a19b3cbf6f42bec3a425adace28626226f2f9
SHA512
250e22ef79f3e6061276717d41e659cf87847223b60bd269c3d4e06b3dd96575798d7ec0de6f5c5d7a3c1cc3097e917ea840dee1e03c03f2c4eaade86faa9c2d
SSDEEP
1536:vSwlKC19SnIhSmHtfjb0uUuVMCfocNWzBVamxwXv/Ni:nAMHeuUuVlAhNIQSi
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE