DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
17bd9d393366a4b823527b3e638dc9fa6f725f8efbc9449e55b8e70980159ba9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17bd9d393366a4b823527b3e638dc9fa6f725f8efbc9449e55b8e70980159ba9.dll
Resource
win10v2004-20220901-en
Target
17bd9d393366a4b823527b3e638dc9fa6f725f8efbc9449e55b8e70980159ba9
Size
30KB
MD5
5b51a2440014b80fae3ad4b1dda9efb4
SHA1
860d2106fd87b09b7905ad616a78feea2c8531f1
SHA256
17bd9d393366a4b823527b3e638dc9fa6f725f8efbc9449e55b8e70980159ba9
SHA512
0badaeda7b055c1f4518d1406a18531726fb0125bc71e4a436a144b2960ef3e4083034ea4e14050e35a541f5a8569251884e75dac69516d18621f1339e9916bc
SSDEEP
768:xKSqqu4u0GQPnOGbsOL7YhJPaJGf1H3tGrrbdPRB:zqqu4u0GQ/TvAJPa+0bJRB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ