DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
da60e5de21fa19033d4af008effb3cd13c830d2ac286e2469a2a0a7d55a01d08.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
da60e5de21fa19033d4af008effb3cd13c830d2ac286e2469a2a0a7d55a01d08.dll
Resource
win10v2004-20220901-en
Target
da60e5de21fa19033d4af008effb3cd13c830d2ac286e2469a2a0a7d55a01d08
Size
46KB
MD5
1a9ece5b020fac036ed60ea15eb024f0
SHA1
46dfe95ae3b732f103b9cea88cc125ea592a0b85
SHA256
da60e5de21fa19033d4af008effb3cd13c830d2ac286e2469a2a0a7d55a01d08
SHA512
8d2f7712101fd6308da0387b0b5279e2e43f37f59b7fef2f5fac692f67173ecabe577409a2dc4caae9ee21077244eac939e0a8d6ff2a56fa2a85e874572c1e12
SSDEEP
768:VSQMqQCpiQoMxKbwKHVsoo9z8iO5OpBlgxtP7VmFchMXJie04MCxOaA9t:UQMqFpiQm1R+IiGOpBlgxAclZE2t
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ