DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookCl
HookOn
Static task
static1
Behavioral task
behavioral1
Sample
225c3b851102b820aad547c7509bd12c6f0e871371113ee37df09f460527ef98.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
225c3b851102b820aad547c7509bd12c6f0e871371113ee37df09f460527ef98.dll
Resource
win10v2004-20221111-en
Target
225c3b851102b820aad547c7509bd12c6f0e871371113ee37df09f460527ef98
Size
28KB
MD5
9d9997c272e63d3843ff46cbea205547
SHA1
23fc96d7ca3ebbc713b918e0130a3ef4fa57d9ae
SHA256
225c3b851102b820aad547c7509bd12c6f0e871371113ee37df09f460527ef98
SHA512
68ba02c32b45d8f62745df1e84e156280e2b19ae5b1117638c1ad42256c30518849f369ec1cec34fcf4e04c77eb080196445a347b8f07ffd1f6bfee343657087
SSDEEP
768:lKSCquFw0GQy+7R4f3dYNgCm4zlRQjKvmdF/7EPq:/CquFw0GQBSfdmNZRQ3tcq
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookCl
HookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ