CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
b99b7b99c4138212a8a9bbce1dc8d3f9c4fd4a79bc09e0a1d2292eb2d7a03c26.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b99b7b99c4138212a8a9bbce1dc8d3f9c4fd4a79bc09e0a1d2292eb2d7a03c26.dll
Resource
win10v2004-20220901-en
Target
b99b7b99c4138212a8a9bbce1dc8d3f9c4fd4a79bc09e0a1d2292eb2d7a03c26
Size
59KB
MD5
4f2223c879a5c7b7da8f407c6d7fc478
SHA1
a141f5afe1d72c4fe0b3415ac5d961f8105c6412
SHA256
b99b7b99c4138212a8a9bbce1dc8d3f9c4fd4a79bc09e0a1d2292eb2d7a03c26
SHA512
7133a5a6384bbca6dbd972415d98573455d56b00b1bd09ec40fd65f2395b4cbf2e30a76edaaf46aaa26aff0ab953997fdcbe75618ad7662647aab42b3e234213
SSDEEP
1536:+fQAl+7ovOoyhlVgYkKpcvRoN79wRuMBfSwyKy953:aQAl+poAgYkKERo99BMFn0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE