CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
76152e14fd275d5326fbe4de500fba7758887d9e5b196e4b29d5be01807c145a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
76152e14fd275d5326fbe4de500fba7758887d9e5b196e4b29d5be01807c145a.dll
Resource
win10v2004-20220812-en
Target
76152e14fd275d5326fbe4de500fba7758887d9e5b196e4b29d5be01807c145a
Size
66KB
MD5
0b6acddbd642e07539e4024369334bdd
SHA1
2964ea31faabff1c59833145bca70be0cd26d6ff
SHA256
76152e14fd275d5326fbe4de500fba7758887d9e5b196e4b29d5be01807c145a
SHA512
30e475bd232f4e918ff2131272843dcdaecf2191f3e079878459252f38e001c9c0a9ec5f4168c5095585270a288ab09973ac814081ab0b474fb77ad06d732520
SSDEEP
1536:BfQAl+7ovOmsvb1dUPU7f0oANSW4Xe68+0Sa2BHyHDp:dQAl+pm8bLsAxMyu613a2BeDp
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE