DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
0c59da42f52e75c9a8f85ae987a97132213647427793e4f9f67ab54833f2c072.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0c59da42f52e75c9a8f85ae987a97132213647427793e4f9f67ab54833f2c072.dll
Resource
win10v2004-20221111-en
Target
0c59da42f52e75c9a8f85ae987a97132213647427793e4f9f67ab54833f2c072
Size
46KB
MD5
4e2a49383964e9756a04feb667bee38b
SHA1
00368b5aa7e7ef3bcdb8a0a2a00aa63104d80bad
SHA256
0c59da42f52e75c9a8f85ae987a97132213647427793e4f9f67ab54833f2c072
SHA512
5e0fd57da83dfe583361047290d4cd60421250fd23479fed310a32ea22a59fe1dd449f373392f26b929baf486ca13e3f3662d978eb5a35be4d03fb2f541948ce
SSDEEP
768:ok1SQMqQCpiQoMxKbwccPPEiO5OpBlgrtPDM1dnhn80pf/R5QPdQ2xOalrzj:ok0QMqFpiQm5cPsiGOpBlgrmhn80TKWe
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ