CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
6a6b4632ea931ca46bb370a439ff8627efa8d8dc719dc7a89a6bea103dc258ca.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a6b4632ea931ca46bb370a439ff8627efa8d8dc719dc7a89a6bea103dc258ca.dll
Resource
win10v2004-20220901-en
Target
6a6b4632ea931ca46bb370a439ff8627efa8d8dc719dc7a89a6bea103dc258ca
Size
80KB
MD5
6384c3873ea654d066cb1b2b0fcb310b
SHA1
d2bf3b9d5d3140c91fcaca93487a6932723f7ff8
SHA256
6a6b4632ea931ca46bb370a439ff8627efa8d8dc719dc7a89a6bea103dc258ca
SHA512
41b242570b3d3870d62e75f2ffa4794104b84fdbc2b82ed7d6de86d0cd3a5f2f2d765f085fa03f74a23b8295798b7e00ff12ce2c50cc35585b7d304da277401f
SSDEEP
1536:vSwlKC19SnIhSmRCSwqM2bqrnV5VhGP22iml1+E4vR6UrCNxweMZ5lK:nAMbwqanPwLixnvPWxxek
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE