DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
Static task
static1
Behavioral task
behavioral1
Sample
8d4b006aac83b7fe50e39d2bebbd655a094b72170867bd9f92c096043a5295f4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d4b006aac83b7fe50e39d2bebbd655a094b72170867bd9f92c096043a5295f4.dll
Resource
win10v2004-20221111-en
Target
8d4b006aac83b7fe50e39d2bebbd655a094b72170867bd9f92c096043a5295f4
Size
44KB
MD5
460c14ee660d5f3a3ef50ec405301452
SHA1
04bb4356e902ac49cf863869603a7b4e29d2ccac
SHA256
8d4b006aac83b7fe50e39d2bebbd655a094b72170867bd9f92c096043a5295f4
SHA512
53e52b511d627ac0ebf48dbc612111bff8f2b2b99643f5874b37fb685743c568cfcc66975bf1f08d6fb9e8941274df29b4a5adf82e8ea14d8fd3daa99235f60f
SSDEEP
768:t88F+8S1Rh3eBh3m7PzXie3kw/CVYIpy63oyn9Q1nxExdEbl3JJ:tjS3U3m7PzTk7TF3oy9AxUKJ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ