DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
d47cf981321b439270b7f972b51f2cd12bc5afc40e45bd2c1568a377c443f91a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d47cf981321b439270b7f972b51f2cd12bc5afc40e45bd2c1568a377c443f91a.dll
Resource
win10v2004-20220812-en
Target
d47cf981321b439270b7f972b51f2cd12bc5afc40e45bd2c1568a377c443f91a
Size
30KB
MD5
b18bcf3172f5f3e4d6b880b2a2ee5655
SHA1
0c572cbc2b6670b87b0af4af90b872bb9f32dff6
SHA256
d47cf981321b439270b7f972b51f2cd12bc5afc40e45bd2c1568a377c443f91a
SHA512
970222bcc5f6a47225a72b143758a08a06d84b940ddf9b7a4de878bce375022de0c4b5877943a6fccd5c1842c62d6da8de4ca306e902cd51c133988946fe846f
SSDEEP
768:xKSqqu4u0GQPnOGbsOL7YhJPaJGf1H3tGrrbdP9:zqqu4u0GQ/TvAJPa+0bJ9
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ