CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
1db4c5a0e56926e469bccdc751fb6b9d8254796073ec71b5f7163b06d0b79190.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1db4c5a0e56926e469bccdc751fb6b9d8254796073ec71b5f7163b06d0b79190.dll
Resource
win10v2004-20220812-en
Target
1db4c5a0e56926e469bccdc751fb6b9d8254796073ec71b5f7163b06d0b79190
Size
74KB
MD5
4edbc8d0534195e8c3a1fc982ecf7aeb
SHA1
cb8c1b7a6cb8c02c5526ceb0a62f030eea54c8f0
SHA256
1db4c5a0e56926e469bccdc751fb6b9d8254796073ec71b5f7163b06d0b79190
SHA512
5f22bbdffbfc3529787843c0ad62df49eae56b711f7e63b63df553ad21a880e3deb6d82c46499978380a4eef79fbbe9451a55a977ac465e2520b1bf5a790c03c
SSDEEP
1536:vSwlKC19SnIhSmiyat7AlVSAfFjKnywi1IWfYCZSsWJltVVPnAvE2xaUa:nAMiyDVXteupD4sWJrPAPaUa
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE