DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookOff
HookOn
Static task
static1
Behavioral task
behavioral1
Sample
5ddf2c27693b73464c9f649bb2671c3a99fb01260ced5648bc788bb3de447a64.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5ddf2c27693b73464c9f649bb2671c3a99fb01260ced5648bc788bb3de447a64.dll
Resource
win10v2004-20220812-en
Target
5ddf2c27693b73464c9f649bb2671c3a99fb01260ced5648bc788bb3de447a64
Size
26KB
MD5
84e647fbbe310422f50db11fe583d8e5
SHA1
9bf601fa1b6abe0ba5d8edf9e0bb7fc7f5f8fa3c
SHA256
5ddf2c27693b73464c9f649bb2671c3a99fb01260ced5648bc788bb3de447a64
SHA512
cdfa3c043b439245ec5fc44db6d720746327784c4ae4c7ca236ac88446edc63e1728a01c1c8c422f1a92d455985fd44270064681201c6d3682651a6bfa6721fc
SSDEEP
768:O+DI8pzkwAyWD4LesS5RC/13wCdjqZvLM:O+D7Opsif5RC/ZwuiLM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookOff
HookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ