DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetHookOf
GetHookOn
Static task
static1
Behavioral task
behavioral1
Sample
e4fba716dca13fbc7d124e18d06df646d689c8d95ad06f6eab8ae6b05722fb2f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e4fba716dca13fbc7d124e18d06df646d689c8d95ad06f6eab8ae6b05722fb2f.dll
Resource
win10v2004-20221111-en
Target
e4fba716dca13fbc7d124e18d06df646d689c8d95ad06f6eab8ae6b05722fb2f
Size
29KB
MD5
32f1387b39f306f8e061047ffed537ab
SHA1
db1383f5d6155073afb102a92deb07da9176000e
SHA256
e4fba716dca13fbc7d124e18d06df646d689c8d95ad06f6eab8ae6b05722fb2f
SHA512
4f4a21a43c6b72ae958994cf1e4ef3763fc41ee964431fb4e43b77bc11d487ffd9d6735dccd7dbf018748b3e11a4d947f826d3cde953ae50a6158ce48be387ca
SSDEEP
384:dyuzek/ySFy8JXbVtIEj0M/mR0HIPu+NDBe0epztNyOBYS77tcAzdfrMFMge:zM8JXbVtN0/R0HIxBGtKGRdf8W
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetHookOf
GetHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ