DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
47b855c79d7ba242794b2260adf80e5a21d8bad2417c57b05a2c4da60b31c30b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47b855c79d7ba242794b2260adf80e5a21d8bad2417c57b05a2c4da60b31c30b.dll
Resource
win10v2004-20220812-en
Target
47b855c79d7ba242794b2260adf80e5a21d8bad2417c57b05a2c4da60b31c30b
Size
34KB
MD5
c4fb61700536b30564ff23839c666bff
SHA1
c2caf91270eec91144e84bce81006af11e049676
SHA256
47b855c79d7ba242794b2260adf80e5a21d8bad2417c57b05a2c4da60b31c30b
SHA512
29c64f26a6957e3ca5dd9a186f0c2f5679e9db670c0eafc9386487ce68abcbee476e1cce5de920cc50ddcdef4bdca651c3315a6bcc62d61873642acb296d7441
SSDEEP
768:pcoi6qZOmQcTpJC6Al4d6yM4ONWFsAyNFt1dKwU7zJW:pcv6qZ7Q2o6dk1WoFtbmY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ