DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
45db12c53194a50d8892c5823b6bd28e50f4a152494c4d6e3c1c694c0798b8dd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45db12c53194a50d8892c5823b6bd28e50f4a152494c4d6e3c1c694c0798b8dd.dll
Resource
win10v2004-20220901-en
Target
45db12c53194a50d8892c5823b6bd28e50f4a152494c4d6e3c1c694c0798b8dd
Size
81KB
MD5
4271e846f1b6cd502124c2af0d531620
SHA1
319fe0dbc6fbdccb9ffc9b45ef28d4e1f9cd3a56
SHA256
45db12c53194a50d8892c5823b6bd28e50f4a152494c4d6e3c1c694c0798b8dd
SHA512
23f639af0a62fee0a88c2527bc1bdf5ef2154b2dcac2bffe1cce01b325a72caa5460fedab428883379117bda4c11762e96132bfe5160221d60e410addf51f332
SSDEEP
1536:+p1qnTQf6yPPzjoWQtO6w65mQoLaCv5KGjkcOkC8eggGAvN+HPYVF:+wTxynPQtV5P2aCv5KGjkj8ePvN+HPYz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ