DllCanUnloadNow
DllGetClassObject
Doknocp
DllMain
DllRegisterServer
DllUnregisterServer
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
161dd0ecfaa8c84385a49c710f58533ed23e28be90e043ce6624dd5009c567f9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
161dd0ecfaa8c84385a49c710f58533ed23e28be90e043ce6624dd5009c567f9.dll
Resource
win10v2004-20220812-en
Target
161dd0ecfaa8c84385a49c710f58533ed23e28be90e043ce6624dd5009c567f9
Size
729KB
MD5
3b53f65a07eb2e0425f1a2032d797e20
SHA1
03ee41831a84013d176fa7f8e7beeb41c3f86247
SHA256
161dd0ecfaa8c84385a49c710f58533ed23e28be90e043ce6624dd5009c567f9
SHA512
612beb0f36ea04379c1d69f1e37251879c12dafbd4f4adc1f08f283f228790b571970ec43dab24cad238012ab9d69dc49830673d73585f39f726cce60efba435
SSDEEP
12288:8tHWGzGzhH1Rc4ZfEkMlhwZ9xe5++X7Ix9WAhH7B3wl8ZLhvF8mCqUsnIGvQPwlL:5XRcPkMT4e5TWhb+AdimJr9
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
lstrcpy
InitCommonControls
DllCanUnloadNow
DllGetClassObject
Doknocp
DllMain
DllRegisterServer
DllUnregisterServer
ServiceMain
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE