DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
fb30ed7f6e82fce593fea0142e859ba55528c366f32e12980545c5f98c9d6272.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb30ed7f6e82fce593fea0142e859ba55528c366f32e12980545c5f98c9d6272.dll
Resource
win10v2004-20220812-en
Target
fb30ed7f6e82fce593fea0142e859ba55528c366f32e12980545c5f98c9d6272
Size
43KB
MD5
56e894a69f4f24e77bd43288568351ac
SHA1
0f39eecb30999daf3b44be60203b7a09b1ba21ba
SHA256
fb30ed7f6e82fce593fea0142e859ba55528c366f32e12980545c5f98c9d6272
SHA512
5d13774f7dcb643bccf780ff4b34a4cb395f561e0e25c62b014d1a1c65887baf41531be2ff05b184bf17799e7f44421fd30f35f73917bd46026cccd362350458
SSDEEP
768:PCSqWQJgeCiOELKj7ltG/iO5OpBlr/Xm7qQCx+FVbhXBuADx4qOV:KSqWQKXELKjHG/iGOpBlrO7Qx+FVVXcf
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ