Dll1CanUnloadNow
Dll1GetClassObject
Dll1RegisterServer
Dll1UnregisterServer
MsgHookOff
MsgHookOn
Static task
static1
Behavioral task
behavioral1
Sample
c361ca6d3eda83cc492a919ceb5601436a8a29593a842f3dc033b37bc5b18e67.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c361ca6d3eda83cc492a919ceb5601436a8a29593a842f3dc033b37bc5b18e67.dll
Resource
win10v2004-20220901-en
Target
c361ca6d3eda83cc492a919ceb5601436a8a29593a842f3dc033b37bc5b18e67
Size
27KB
MD5
ae5e3641af6c6160181666b4fd17eca3
SHA1
fe2285d7810b5f9dd7000fbddd067860c4f7e97e
SHA256
c361ca6d3eda83cc492a919ceb5601436a8a29593a842f3dc033b37bc5b18e67
SHA512
466e0ca4aaf02afd719fa4bdc1662857821b47c4da233490485f780307bf41b3d839ba4a86702e51de46babe8650c1a7e863661de8639d98d7a11091e48d8edc
SSDEEP
384:t7dxz0CuAkqd+1TkQattckmCLP5+SO62cIylISoMGwOBLV5AzDr5Qh5hcO:tgCuVqdSAQWPmCLM6/OMGZ0Dr525iO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Dll1CanUnloadNow
Dll1GetClassObject
Dll1RegisterServer
Dll1UnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ