CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
26a38abe3e13228ba984976fa7b15ac51fa6adda48a808f3478131a7eecd95cd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
26a38abe3e13228ba984976fa7b15ac51fa6adda48a808f3478131a7eecd95cd.dll
Resource
win10v2004-20220812-en
Target
26a38abe3e13228ba984976fa7b15ac51fa6adda48a808f3478131a7eecd95cd
Size
66KB
MD5
800c47ab0096cce2f4f814de036d1cbd
SHA1
7846f2c30176d393611deb1d57031a84f4236eaa
SHA256
26a38abe3e13228ba984976fa7b15ac51fa6adda48a808f3478131a7eecd95cd
SHA512
87ff3f91c8f2026d4b07d4a4152e59d1601e6fe3174390102ba5f232f0a7d5b23aa1340590894e6c54b96facc6fcdca2f15fbee0f3524526642a885714287e2a
SSDEEP
1536:vSwlKC19SnIhSm1vcsqa5VKb6eoG6pwayOy46x4cveb2LE55uG+C:nAMdcsqa5VKb6hPZyfx40EGGF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE