CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
b173b52ce3e531755606f87204b5115541217ec1ddbc9e711cf0e7bebdbca538.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b173b52ce3e531755606f87204b5115541217ec1ddbc9e711cf0e7bebdbca538.dll
Resource
win10v2004-20220812-en
Target
b173b52ce3e531755606f87204b5115541217ec1ddbc9e711cf0e7bebdbca538
Size
77KB
MD5
94118d3fadb90476397d8ece0bb676ce
SHA1
24bc6ed9185e11779eb596ff2d84a53d569322aa
SHA256
b173b52ce3e531755606f87204b5115541217ec1ddbc9e711cf0e7bebdbca538
SHA512
ddb1877b08a5c4a83c7ff09d600e0c6454538bbd9fd3e68435abb27318a51e4f2610f9e8f7b6d98ebc73fd187e947c97a108d015a7e10769b084eb90513e8b08
SSDEEP
1536:5SwlKC19SnIhSmzntBk9/GPns4pN37PnbiNI/Bl24m+IjccBLg:lAMznbm/GPLzbiN0l245Iju
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
_vsnprintf
connect
DeleteObject
UnhookWindowsHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE