DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
03e3e2cc6499ad5754b99ad245a6f755f8c313a2b57a49f92af821866984b512.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
03e3e2cc6499ad5754b99ad245a6f755f8c313a2b57a49f92af821866984b512.dll
Resource
win10v2004-20220812-en
Target
03e3e2cc6499ad5754b99ad245a6f755f8c313a2b57a49f92af821866984b512
Size
47KB
MD5
b974e3da8738a181ac2334681b1dad9d
SHA1
b5ad8f7cb104b5e6d1f6f8947b973493e7400692
SHA256
03e3e2cc6499ad5754b99ad245a6f755f8c313a2b57a49f92af821866984b512
SHA512
ffe5a8a51ebe4d454e12f059d39488bc4c8f1e31d3b2d6c339797a53a80753b183a1fa5500728a9b2b1d3a6276a337359434a2d1c3d0a965f6d7d7e6f7138989
SSDEEP
768:wSVMqQCVaQkUwjWnoGH0gs85iO5OpBlWL4TNWe8tMRBiPdi99uXxMagQdt/u:nVMqFVaQbNH0gB5iGOpBlWLztrdi99qu
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ