DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
ad33a0cde8cdd492c6f4d752708095d8fccc8ed88c28cd4527145fa87678555f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad33a0cde8cdd492c6f4d752708095d8fccc8ed88c28cd4527145fa87678555f.dll
Resource
win10v2004-20220812-en
Target
ad33a0cde8cdd492c6f4d752708095d8fccc8ed88c28cd4527145fa87678555f
Size
45KB
MD5
926989c7cbef18ca88326206c71edcbc
SHA1
33ff959a1cdbd543e54e6d00a97081cbff75a363
SHA256
ad33a0cde8cdd492c6f4d752708095d8fccc8ed88c28cd4527145fa87678555f
SHA512
c7fd6ff866707b9a40b2c6336cc845dc7713a9c6f4d728c54fabe12ad80b9f872284117118500cff88f027439f431451649d98e77a8a7d96d80813ef2c997d3c
SSDEEP
768:01CSqWQ1geCiGsLuYCxqlTiO5OpBliubCRbROJoVm9Vv6nZiD3xVkzLLVqN:0kSqWQGPsLuYCAJiGOpBliVVGkm7iZ2n
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ