CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
ab2ee62b461e2c79a48d47b778dae4abe3589ce72d9aeaa7247d8fbf45599df0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab2ee62b461e2c79a48d47b778dae4abe3589ce72d9aeaa7247d8fbf45599df0.dll
Resource
win10v2004-20220812-en
Target
ab2ee62b461e2c79a48d47b778dae4abe3589ce72d9aeaa7247d8fbf45599df0
Size
63KB
MD5
8ce24145303acd4cf6886ab1be6fa9fa
SHA1
24e00458b8ad74850c5f385ad0da1ae06671c386
SHA256
ab2ee62b461e2c79a48d47b778dae4abe3589ce72d9aeaa7247d8fbf45599df0
SHA512
5ee8a447c079d8c6432a842b52f44744c70b31a91f52b12f3014238e73cd2392c0c5a03cfdc78ccb5462e327563d3bdcfec6d427b6a01c1ab6bd531c88c6c788
SSDEEP
1536:QhFD9njRti+XH4KTpF6fh1nl8KDIhFMIVVLjPZXyOpGGt:Qhx9jnzHrQf3n2VJjBXfdt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE