DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
f2ab0592edc133a04126b61d7c121de967ed3b862547157e5a1d8adc170f49e8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2ab0592edc133a04126b61d7c121de967ed3b862547157e5a1d8adc170f49e8.dll
Resource
win10v2004-20221111-en
Target
f2ab0592edc133a04126b61d7c121de967ed3b862547157e5a1d8adc170f49e8
Size
45KB
MD5
04331dce704d68d07d94fd6b2c46ca59
SHA1
4a8f79921f8df03c9ba939f96463072b9b7bf691
SHA256
f2ab0592edc133a04126b61d7c121de967ed3b862547157e5a1d8adc170f49e8
SHA512
4745018b91464971ecfff8932af6c58dc84cbf324942e88c0775cdbaadebb8cace213e1cff36458c34344420f219671551a5ac24b177edc96d71811244344214
SSDEEP
768:01CSqWQ1geCiGsLuYCxqlTiO5OpBliubCRbROJoVm9Vv6nZiD3xVkzLLV7N:0kSqWQGPsLuYCAJiGOpBliVVGkm7iZ2I
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ