CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
feb5ccb74c4a5e55f607073ee6e7f8043aceff216943ed7f06a23849e0bffb7a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
feb5ccb74c4a5e55f607073ee6e7f8043aceff216943ed7f06a23849e0bffb7a.dll
Resource
win10v2004-20220901-en
Target
feb5ccb74c4a5e55f607073ee6e7f8043aceff216943ed7f06a23849e0bffb7a
Size
55KB
MD5
7c98ff49dd6925dc0ea93be7d7b5f164
SHA1
372c234da3c1976375cfacae3bdbbf692349dcc0
SHA256
feb5ccb74c4a5e55f607073ee6e7f8043aceff216943ed7f06a23849e0bffb7a
SHA512
8643b3bb77e81a6a0153488d4fc6325d036b4247ad4741f9214c3d4c1aef9b76def6dec4641bf80dab266ff68a879d663fd88fe8d8e37b9f69b746e134094399
SSDEEP
1536:T7MYloVC9UD1Tv9QB0fUK8zmV2V4ywDya:U44C9GSBHG2VXoya
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE