DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOn
MgHookff
Static task
static1
Behavioral task
behavioral1
Sample
02bbc6f9db44fe68de34f4ed663fc9d25c01ad17f4e0980827c60aa473940598.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
02bbc6f9db44fe68de34f4ed663fc9d25c01ad17f4e0980827c60aa473940598.dll
Resource
win10v2004-20221111-en
Target
02bbc6f9db44fe68de34f4ed663fc9d25c01ad17f4e0980827c60aa473940598
Size
29KB
MD5
ac01e80209e08df6739418ac940cca61
SHA1
2ee2fd51b665ff45aa36093479a1782655501369
SHA256
02bbc6f9db44fe68de34f4ed663fc9d25c01ad17f4e0980827c60aa473940598
SHA512
90fb4ceab82cdb2c3aada9946e493786696173eb90c23349fb37eb8f125161e44ce54d9d762ca70775738233615994232fa26f387ffaba4a0d0b433a9d3c49ba
SSDEEP
768:zKSqquxD0GQjgRJMeMdmpRDq6Fz3xGUdHjOigB:xqquxD0GQSPyTmkoqDB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOn
MgHookff
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ