DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
67ff4734bb63b2d24f09d14e80ec3565a4a8ce4036815b8c94b4aad522074ccd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67ff4734bb63b2d24f09d14e80ec3565a4a8ce4036815b8c94b4aad522074ccd.dll
Resource
win10v2004-20220812-en
Target
67ff4734bb63b2d24f09d14e80ec3565a4a8ce4036815b8c94b4aad522074ccd
Size
36KB
MD5
65e0fe69803a8948e6cc66d8fd84e46c
SHA1
4cbd6cd0e62a0aef4b4709edb28c944ff4b9476a
SHA256
67ff4734bb63b2d24f09d14e80ec3565a4a8ce4036815b8c94b4aad522074ccd
SHA512
d8cd3fa215a090091d036e6b4cc7999a6d106f8805883272ba371ae34e3be5ed85dec462f9633b661761a7ade4a57a04ca682aa8a2302d210dd937f8aa6f6d8f
SSDEEP
768:zQoi6qZOMQOppi+iaOiqjC3mKnuZbcUKdQwr28w:zQv6qZpQcHIKuh32
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ