DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a130d03f1c1288c49f66f61dcc5b811cd2ba4d2d1b3ec99b960f679286cfcf31.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a130d03f1c1288c49f66f61dcc5b811cd2ba4d2d1b3ec99b960f679286cfcf31.dll
Resource
win10v2004-20220812-en
Target
a130d03f1c1288c49f66f61dcc5b811cd2ba4d2d1b3ec99b960f679286cfcf31
Size
47KB
MD5
e2f960f7dee81a6ce01015c36e747658
SHA1
e4fe3dd1baead8d5cc147f4c631837c6d03a1c09
SHA256
a130d03f1c1288c49f66f61dcc5b811cd2ba4d2d1b3ec99b960f679286cfcf31
SHA512
492d69366193552b674b7a2dbde9ddb081de5aa5d83e6354e85a388692999c09ac904029c2c55bf47a997a85839de88c3d4139289acca49975e5013a1103523a
SSDEEP
768:DSQaMqQaIRQZJhlewk/yfYZbjZSDg56Z7yl/6zdupFxiTw+ktg7:WQaMqtIRQHeyfYpFSDk6Z788wmw+ktk
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ