DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Hackcki
Static task
static1
Behavioral task
behavioral1
Sample
a83bd37b6b5864c00154f7813698f99353481b0ea58506c7afc5030621aedbf4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a83bd37b6b5864c00154f7813698f99353481b0ea58506c7afc5030621aedbf4.dll
Resource
win10v2004-20221111-en
Target
a83bd37b6b5864c00154f7813698f99353481b0ea58506c7afc5030621aedbf4
Size
805KB
MD5
e5d5b1a8edf65e1b86d6aabd2ea98d9e
SHA1
abdfdd3fa24060414857e5e906e1abdb1537f6d3
SHA256
a83bd37b6b5864c00154f7813698f99353481b0ea58506c7afc5030621aedbf4
SHA512
38d164dd8db8f48019344b329d7e5d9a2a53529fb2a9b937f1d3b6436d675babaa9bdb9e64def6f44e14ba7ce0660849621b8d20f522ececec421e815f1cc07e
SSDEEP
12288:us7PZMQhtCUyK2TK7kYFm3Z6xBRQeyyGC14yYm48t8rcYhI/JPK9JKOqLBZ9:ZPZFtCUaTU1OQ5y21xAccI/ecOe
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
lstrcpy
InitCommonControls
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Hackcki
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE