DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
75f72906ad9508276e6138c0cde27cc6d0ba04a2362fec8de3d3268530cb3545.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75f72906ad9508276e6138c0cde27cc6d0ba04a2362fec8de3d3268530cb3545.dll
Resource
win10v2004-20220901-en
Target
75f72906ad9508276e6138c0cde27cc6d0ba04a2362fec8de3d3268530cb3545
Size
11KB
MD5
3d598ed9e8d86a938af560a104277e81
SHA1
80de300362814397164d8b71f806b1f44d6b1b57
SHA256
75f72906ad9508276e6138c0cde27cc6d0ba04a2362fec8de3d3268530cb3545
SHA512
c0916b5d5df219319f6716bf761c41f737386c2698543a6c0a0f0b97cbf2d91cb3d8dafcb7a0178acb58307487306d1fd5ead4922d2bcedb33249e39416318db
SSDEEP
192:qzI3XB2kLE0ikSwUqZlw8CrrUKYyHFAWcn7gVmsAkseFdkgUwuVAv:qzmlLtiOUqZluwKYGGWcn7gVmB0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE