CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
bfdc77d0a275f0f60212c93070f7049914f8c499cbc26216dc0548a5e2ad1c14.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bfdc77d0a275f0f60212c93070f7049914f8c499cbc26216dc0548a5e2ad1c14.dll
Resource
win10v2004-20220812-en
Target
bfdc77d0a275f0f60212c93070f7049914f8c499cbc26216dc0548a5e2ad1c14
Size
63KB
MD5
61b1caf424e85026759d1ddda15a1090
SHA1
ad367826c63c83c05b53abbe4aa0e229c461fe18
SHA256
bfdc77d0a275f0f60212c93070f7049914f8c499cbc26216dc0548a5e2ad1c14
SHA512
6293aeab2227010a56c56b721d854403b4d37520769aebdd1dc8ff37978c3a8d89666125dd9b96e116bba54717fdb9176d73b57efc8513958c5a5e9b9e2fcba2
SSDEEP
1536:BfQAl+7ovOXnVxqFYB+45V/UQWPyzLMcoD7DbNPobnMm:dQAl+pXj+YB+4rMQWqMn7DbNPobMm
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE