DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookCl
HookOn
Static task
static1
Behavioral task
behavioral1
Sample
c14c09952feb3dba4e46a33b9f3f255e945fa8842b4e4de732af9e59481338d9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c14c09952feb3dba4e46a33b9f3f255e945fa8842b4e4de732af9e59481338d9.dll
Resource
win10v2004-20220901-en
Target
c14c09952feb3dba4e46a33b9f3f255e945fa8842b4e4de732af9e59481338d9
Size
27KB
MD5
524cf76c080ddcda175a15db3f730735
SHA1
5d1d3f830990ce3f3e3e82b6342c3817476cd7e9
SHA256
c14c09952feb3dba4e46a33b9f3f255e945fa8842b4e4de732af9e59481338d9
SHA512
5970d161a48d7f4aab9baca5e595f6d1304ed976c97d4b2ff5095ca70a2bde4b87f1834ded07027b02c86ee91a8bafd09a506c2f0a1104bffbca654fef7cf398
SSDEEP
384:nmcxz0CKAoqd+13XQaJtu4IZcS/SzbWe1fQwbEKQQgCs7Y6fAzdj6QQjmA8Wl:m5CKBqdSHQOYXPSzye1mQgf0dj6QRml
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookCl
HookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.