CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
d7bef57a4303919bcfe50f7116c9a1e3bf7f50291c403c49d88682555944f644.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7bef57a4303919bcfe50f7116c9a1e3bf7f50291c403c49d88682555944f644.dll
Resource
win10v2004-20220812-en
Target
d7bef57a4303919bcfe50f7116c9a1e3bf7f50291c403c49d88682555944f644
Size
73KB
MD5
662075bd4193d8b348abce90b25af806
SHA1
c60f27582a96554c8f53cc17a524f3ae08200f3c
SHA256
d7bef57a4303919bcfe50f7116c9a1e3bf7f50291c403c49d88682555944f644
SHA512
540674bad3b9cd05934f43c4055ced1c80f33ecf77d879ad903028bb27b496bda065b8e747fc7fe1a072093945072979166cd6bd26d7a94409be7e741cd2dc7a
SSDEEP
1536:PSwlKC19SnIhSmetu0C+YtYpWPSQ3dFZj3hyzL+QVr7KenZkWvXRg5HBof3/G:HAMN0yYpxQtFZ8PniD5cO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE