CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
83db7b4f5b434f97a38f74a514411ca51c8d6d8a87c95ac44e6e4d1d82c9fca4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83db7b4f5b434f97a38f74a514411ca51c8d6d8a87c95ac44e6e4d1d82c9fca4.dll
Resource
win10v2004-20221111-en
Target
83db7b4f5b434f97a38f74a514411ca51c8d6d8a87c95ac44e6e4d1d82c9fca4
Size
55KB
MD5
f4321c5bc42869b255476ea423885357
SHA1
1261793e3439f5299e5fcca0ace1a2cba506d62c
SHA256
83db7b4f5b434f97a38f74a514411ca51c8d6d8a87c95ac44e6e4d1d82c9fca4
SHA512
fb15bc54eb34dfdf371a8383bf75da5f12a04d1983dd1b5cf9def11ca237fd3f4499a8707da73c4ee9e923f2640110234165c5c3a7ce462a4c7a96b486815957
SSDEEP
1536:BfQAl+7ovOAzq8LJUDOxzjYm8qFhPLmelz/nzsSDDLGFIMFYtp:dQAl+pAzhlUaxp8Mhjmaz/zsS/eZMp
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE