DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
b26dc3358b041871947a5c9f58f72619d849a04f373139c6482950a545d82f22.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b26dc3358b041871947a5c9f58f72619d849a04f373139c6482950a545d82f22.dll
Resource
win10v2004-20221111-en
Target
b26dc3358b041871947a5c9f58f72619d849a04f373139c6482950a545d82f22
Size
47KB
MD5
0a6f5295fd0ad2b24579fc2e90f756c5
SHA1
69f11c9548253d562f7a399f6811558a6c313aa2
SHA256
b26dc3358b041871947a5c9f58f72619d849a04f373139c6482950a545d82f22
SHA512
3cae66da36af56808f9638cc1861bd28b64829ffa0a746185360f4a7a883c7ab1bf56139a35943b81665d9fffa87deacf41593a7d55f32e4a881a3a5fb6345d8
SSDEEP
768:sSVMqQCVaQkUwjWnof6hi9k9iO5OpBlRT4zud/JBKV4ZPZISgI4xOHYQngrT:LVMqFVaQbo6hik9iGOpBlRTFnruSgBQW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ