DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
Static task
static1
Behavioral task
behavioral1
Sample
eb02b510461903b4eddbdf38ee198e26ab0645e7baf33bc39d337cc5a69c7740.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb02b510461903b4eddbdf38ee198e26ab0645e7baf33bc39d337cc5a69c7740.dll
Resource
win10v2004-20220812-en
Target
eb02b510461903b4eddbdf38ee198e26ab0645e7baf33bc39d337cc5a69c7740
Size
34KB
MD5
60b6e813682a3b03fad075baf2943a11
SHA1
6f78828bce23ac74d05036d4a84882c78b4bd4b2
SHA256
eb02b510461903b4eddbdf38ee198e26ab0645e7baf33bc39d337cc5a69c7740
SHA512
349fcef27b650a316e6356b245cde785477c3cc38e211d2835adda9da38bcaa06c1deda8417114c0d367cf55b50ccacc3776b3ed09b1538624f376c2281109cd
SSDEEP
768:LSACC8pTkwAyWD4wX67SKlVvH7dn+zXYrd1gbFt3iR:LSACupsHXVjdn+zXYhGIR
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ