DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
7b9bcce1ed8cc2f8c9234037d4086d633d53394038369b9ff4b72e072e2158f4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b9bcce1ed8cc2f8c9234037d4086d633d53394038369b9ff4b72e072e2158f4.dll
Resource
win10v2004-20220812-en
Target
7b9bcce1ed8cc2f8c9234037d4086d633d53394038369b9ff4b72e072e2158f4
Size
47KB
MD5
bd61ae217938df33bbd53a1e02d1c6d9
SHA1
b5aaf9aa141a1627da4bce2a3b77295be140e8df
SHA256
7b9bcce1ed8cc2f8c9234037d4086d633d53394038369b9ff4b72e072e2158f4
SHA512
6d2762764142c7221bd3a29e1a8601fc3b5efbe0457a7b407bebc6ec853ade94f3999e3f73d26833977a16543c683a6ef1a65cc119f2bde3f4f348a85587bdef
SSDEEP
768:NSVMqQCVaQkUwjWnoM4e+PU0+ImiO5OpBl4SyPkJDJBMxz5PO0D1cyHrxOHQQGA7:sVMqFVaQbv4e+PZ+ZiGOpBl4SBJOOYcj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ