CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
ed306591eabf27b6c23ce6ffb49ae1fbb1f0aa5c2fe395f8448997908ebddbcd.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ed306591eabf27b6c23ce6ffb49ae1fbb1f0aa5c2fe395f8448997908ebddbcd.dll
Resource
win10v2004-20220901-en
Target
ed306591eabf27b6c23ce6ffb49ae1fbb1f0aa5c2fe395f8448997908ebddbcd
Size
62KB
MD5
2ab02015301df2d42cfa4546ed975514
SHA1
23379ddabe768239ad555123485b5e596e04579f
SHA256
ed306591eabf27b6c23ce6ffb49ae1fbb1f0aa5c2fe395f8448997908ebddbcd
SHA512
b6748e271b48a91d877c9d4025343a974a225aa974e13437bc28af258d99be4f409b7cdb45ef098c287334b8ab01e1892607c4f4343011434c232541f1f03d07
SSDEEP
1536:BfQAl+7ovOhkeUDQDcT1oV4FY10d+dP4rrg3p:dQAl+pJUXTy4Q5Pn3p
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE