CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
eb9a88bfeb9fd95ebc353866a3787e9e81f4be61929cd93d51a7a874cfcba2f2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb9a88bfeb9fd95ebc353866a3787e9e81f4be61929cd93d51a7a874cfcba2f2.dll
Resource
win10v2004-20220812-en
Target
eb9a88bfeb9fd95ebc353866a3787e9e81f4be61929cd93d51a7a874cfcba2f2
Size
74KB
MD5
66280ccff8ebc37795659a8e95651a94
SHA1
e456578e70978c4f78636d9e80740584b33ad9ec
SHA256
eb9a88bfeb9fd95ebc353866a3787e9e81f4be61929cd93d51a7a874cfcba2f2
SHA512
72715752e4de29a05bc6a9a233c198ffa2c08068d273d9a096f2f256f9da3301cb031b7798f078d0314616a71bb3adc2bfbe6226584a3d2ce3611a04112ee73e
SSDEEP
1536:MD7jQuJl5hfT087Mh3jWJg9ARvJN3gtp695ydRc:iJ6T/uvJN3R6jc
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE