DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
Static task
static1
Behavioral task
behavioral1
Sample
f403585f34f790d57d1d70257fa1276596dfc33960f6138bcc629014262efbdf.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f403585f34f790d57d1d70257fa1276596dfc33960f6138bcc629014262efbdf.dll
Resource
win10v2004-20220812-en
Target
f403585f34f790d57d1d70257fa1276596dfc33960f6138bcc629014262efbdf
Size
36KB
MD5
899456635ea0a60dffcc0949aa736d79
SHA1
4442003ecdf6fed75d96a797c07313fe91774d05
SHA256
f403585f34f790d57d1d70257fa1276596dfc33960f6138bcc629014262efbdf
SHA512
f1dc8c22fdc0145d6fb0b448681a981365455cfdb5927769f1ba2a213b2338b4951b68834a059481b42bd0f804b495e3647a9e449706e42dc5ebc00e3a682946
SSDEEP
768:kvSACC8pHkwAyWD4kFKvV3zlUxHpANMMJh8OVqUd1V+JK3vp:kvSACapsgKvVRUFpnSh8OV1emp
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ