CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
e388c8a6084a1db8f1550c470dd0e3416c9b162af31a8e682f76d32a97fe5c0d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e388c8a6084a1db8f1550c470dd0e3416c9b162af31a8e682f76d32a97fe5c0d.dll
Resource
win10v2004-20220812-en
Target
e388c8a6084a1db8f1550c470dd0e3416c9b162af31a8e682f76d32a97fe5c0d
Size
58KB
MD5
926292e5d4c65a098b113165dcd2d123
SHA1
14e505dcc74b84500ab74bd5036db61e995a0a36
SHA256
e388c8a6084a1db8f1550c470dd0e3416c9b162af31a8e682f76d32a97fe5c0d
SHA512
be8cf3e37a8a3c146b04920bfb1c1e672e93a29de2e20d598d0cba2c4e04386e2f0b0c66e5b78a46d0ed00ae62982f844d8a8e40e35f3f36f7110d05e96debc3
SSDEEP
1536:dfQAl+7ovOOt3GiP27s513G1NGHiqjr6pv9AFf2IjhwAU:5QAl+pgGEhI2Ff2IjI
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE