DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
9788513f84fca60393b0b2e4e809a424e3299a8fe4f3baa614da5ef4d425abf6.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9788513f84fca60393b0b2e4e809a424e3299a8fe4f3baa614da5ef4d425abf6.dll
Resource
win10v2004-20220812-en
Target
9788513f84fca60393b0b2e4e809a424e3299a8fe4f3baa614da5ef4d425abf6
Size
47KB
MD5
3c9c0973820353b434ffb1b67f6c5027
SHA1
626bf8071626fb844ff9b913723085c89fb8883b
SHA256
9788513f84fca60393b0b2e4e809a424e3299a8fe4f3baa614da5ef4d425abf6
SHA512
8aaa0c83eaac6e6e31f63ba2d1c7e2d60daa43b95618f7b0d06e5670da1462a64af084d7ea4a374d57e0518c6b859afeb18d7ab5c41d57d5d414550da4707634
SSDEEP
768:xSVMqQCVaQkUwjWnoAnvNgidiO5OpBlk9iLxd5+TIc20mzcXgPY7LhxOH3QB9dgx:IVMqFVaQb3nltdiGOpBlk9kd5q7vKQSx
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ