CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
cfc6d916aa412d1f404e4366d29ed3b9b22c4ec25a37a8a4e1b7a4cca6c412d3.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cfc6d916aa412d1f404e4366d29ed3b9b22c4ec25a37a8a4e1b7a4cca6c412d3.dll
Resource
win10v2004-20220901-en
Target
cfc6d916aa412d1f404e4366d29ed3b9b22c4ec25a37a8a4e1b7a4cca6c412d3
Size
78KB
MD5
0e64dde9ae583814de8a1976e164d7b2
SHA1
77e6afa4a6e16501e63f3150d554955b3ebe9110
SHA256
cfc6d916aa412d1f404e4366d29ed3b9b22c4ec25a37a8a4e1b7a4cca6c412d3
SHA512
cf2b4dafe72391efde82ad150aaa0c883591756fa16060aae194fbab2201d7131d63dba5cb8a968b7366f03e5f1276a556d44bdcbdb16164c39586049dd8750c
SSDEEP
1536:PSwlKC19SnIhSmetsB+dzGFceVE2ezjJZHLTSWdsTabfk:HAMJB+dzabVE2UjbPRUabfk
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE