CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
0eaa7edf08c4958f4f3250fade251cefa9e0734478098870ba7a0d54faa72b1f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0eaa7edf08c4958f4f3250fade251cefa9e0734478098870ba7a0d54faa72b1f.dll
Resource
win10v2004-20220812-en
Target
0eaa7edf08c4958f4f3250fade251cefa9e0734478098870ba7a0d54faa72b1f
Size
63KB
MD5
51722410b766274149c6c2173c06efe0
SHA1
f7b631d9595293f4bdc020548e969f3a83b922f8
SHA256
0eaa7edf08c4958f4f3250fade251cefa9e0734478098870ba7a0d54faa72b1f
SHA512
2eecb0a44b4dd070e8d43e04dd0b5e85e86222bbb3b35ebb874483128a5b69bf811c86962305caf1bff5c5c9444017fb52e0a8985752c6125e85948afa383702
SSDEEP
1536:BfQAl+7ovOgomj1tiCF6WLDyMaPHsiJOCgcj:dQAl+pgNjXiE6qDXaF5zj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE