DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOn
MgHookff
Static task
static1
Behavioral task
behavioral1
Sample
9d1700e2fa31343e0dbc58f3278c5010674a0aa49fe44d4ef30d8a1a4fb04514.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d1700e2fa31343e0dbc58f3278c5010674a0aa49fe44d4ef30d8a1a4fb04514.dll
Resource
win10v2004-20220812-en
Target
9d1700e2fa31343e0dbc58f3278c5010674a0aa49fe44d4ef30d8a1a4fb04514
Size
30KB
MD5
d7d40ab69e5a8fbbf6f704c4e713e6b4
SHA1
f1009d06c8528a4b6d32385bc9fa9a0c50ca2ca0
SHA256
9d1700e2fa31343e0dbc58f3278c5010674a0aa49fe44d4ef30d8a1a4fb04514
SHA512
2c51e0d9aeba4ee316172d1e5955869e8a886ef1cae4b1e40abb511f96eaccca2ddf5ec360a05b679370c9b59d996ff82c7889bec623e5f3b643ce957d79c952
SSDEEP
768:qKSqquxD0GQjgRJMeLuKCpektNtVEXdhjMia:eqquxD0GQSPLuKCtENy
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOn
MgHookff
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ