DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetHookOf
GetHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ae75c744e38f1858ddbaa13ce37128b15e83b24e869e6defee0c44302239710b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae75c744e38f1858ddbaa13ce37128b15e83b24e869e6defee0c44302239710b.dll
Resource
win10v2004-20221111-en
Target
ae75c744e38f1858ddbaa13ce37128b15e83b24e869e6defee0c44302239710b
Size
29KB
MD5
18504de84cefd60117bf98ab460cf124
SHA1
95e408f235f00a386f1e7f45fa2407dbba0e687c
SHA256
ae75c744e38f1858ddbaa13ce37128b15e83b24e869e6defee0c44302239710b
SHA512
71e8cf1fa7afb499756c74886522a7f9e7029a5ea6b06342cffd498c7d2aa057bf060c250a10fc269eda4cb59c40a9114b575cd64c1862f4760c5c72261ceb93
SSDEEP
384:Vyuzek/ySFy8JXbVtIEj0M/mR0HIPujX77Q6qIMMjFKj2Xjo4TXAzdfA/ZFpmV5:rM8JXbVtN0/R0HIx3MjkwjYdfUk
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetHookOf
GetHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ