DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsHookOp
MsHookif
Static task
static1
Behavioral task
behavioral1
Sample
da8304606755ea2c29e641357bcf8620213c70432943cc5dc4155ba20eadbb3d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da8304606755ea2c29e641357bcf8620213c70432943cc5dc4155ba20eadbb3d.dll
Resource
win10v2004-20220812-en
Target
da8304606755ea2c29e641357bcf8620213c70432943cc5dc4155ba20eadbb3d
Size
45KB
MD5
67ba98381686c0293f86b803e2059330
SHA1
d4d90242053d2588ed0430c23e39d5c9dff179c0
SHA256
da8304606755ea2c29e641357bcf8620213c70432943cc5dc4155ba20eadbb3d
SHA512
b1bc4d55b34e645eed62e528c636188472d044ee7017f79fa23ec6e1fad3dd07a27685eedcaeb293e22e82ee8e4d76928f686e994c6188f0b8550fd4a1be7179
SSDEEP
768:U881R5oxNRHZs5LGE2EHJ2iHCjMASEzyD+rzQQpEVIrLhTQ0x4oUlAk:UzC5s5LGE2aciHCj/SBipE+nhTQgKlAk
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsHookOp
MsHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ