DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
b44427fd03cdc4573351b853d5e91d020db226f9d663c2705b15a6b6c308ce90.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b44427fd03cdc4573351b853d5e91d020db226f9d663c2705b15a6b6c308ce90.dll
Resource
win10v2004-20220812-en
Target
b44427fd03cdc4573351b853d5e91d020db226f9d663c2705b15a6b6c308ce90
Size
158KB
MD5
4c6cc1dea94182e8ce68411fc31f15e0
SHA1
6fa7f675dbecd2e088109ae47e6cdf623f413ece
SHA256
b44427fd03cdc4573351b853d5e91d020db226f9d663c2705b15a6b6c308ce90
SHA512
7d8e54943172e4201b8a56d91fccbf3282b3b4ce12e35f957579695ed90e8b7d86942fbbf3817e796880fcd2612921a1560f57ff66272f5a527125eb8accaf23
SSDEEP
3072:gphXNC9sz+QS3PhXZ/mBLIq0lX7VLDLDdq:U4PMIqeX7VLDvd
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE