CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
2df9b602d0e784135454d9eca373e4b126954cf50aa8c31f5ed4023ab66e2677.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2df9b602d0e784135454d9eca373e4b126954cf50aa8c31f5ed4023ab66e2677.dll
Resource
win10v2004-20220812-en
Target
2df9b602d0e784135454d9eca373e4b126954cf50aa8c31f5ed4023ab66e2677
Size
74KB
MD5
92552a37f7308151f415324b4c7f7b71
SHA1
c456eac8faf477f520777af675d4d457ca6329ee
SHA256
2df9b602d0e784135454d9eca373e4b126954cf50aa8c31f5ed4023ab66e2677
SHA512
3b4b1be545cc6f7efb49ab76293887e99b4b0613aa395967e8426f958fff1f44e9a5a7a5aacdc55e9462da71256d3c3b81776aee3e5832b95b042354248281de
SSDEEP
1536:PSwlKC19SnIhSmetMgwDjyKk+CfIyZiGvX/IJG7iUs:HAMPnDjJLCwWi0X/8G7s
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE