DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookCl
HookOn
Static task
static1
Behavioral task
behavioral1
Sample
d01bbf8103b3009fe723fcc788a60f43e35f41b04b5d24851bfbaf662ee15dbd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d01bbf8103b3009fe723fcc788a60f43e35f41b04b5d24851bfbaf662ee15dbd.dll
Resource
win10v2004-20220901-en
Target
d01bbf8103b3009fe723fcc788a60f43e35f41b04b5d24851bfbaf662ee15dbd
Size
27KB
MD5
53e5c72e1b3ea094282d094ae6d4a8b5
SHA1
205590faff8713c46425910daf050b0d68153839
SHA256
d01bbf8103b3009fe723fcc788a60f43e35f41b04b5d24851bfbaf662ee15dbd
SHA512
55cbcf808893073cb893c7b56d987986fc3c5072f3d0a6e282d7b6af48a4cd9a27640c49e566f4dad5a8db1d211eacdcd9dfc8d197ddfe3a76fe84a0421f4269
SSDEEP
768:NKSCquFw0GQy+7R4f3dndCMrqotdj/khFbsHztT:XCquFw0GQBSfdQyqq4hiTtT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookCl
HookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ