DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1688869753d93d82676f4ac8089fdd4e0a7081029c1b71af785a474423191da7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1688869753d93d82676f4ac8089fdd4e0a7081029c1b71af785a474423191da7.dll
Resource
win10v2004-20220812-en
Target
1688869753d93d82676f4ac8089fdd4e0a7081029c1b71af785a474423191da7
Size
47KB
MD5
908f3726385190bad4916ebfeda0dda0
SHA1
9193e4ca784b198d326eccad55107087a7e98b00
SHA256
1688869753d93d82676f4ac8089fdd4e0a7081029c1b71af785a474423191da7
SHA512
ae949ea40e1c3ca8f6d3853d1704de2a87182e58c3da05a037630a05b60d3a7d75c13edc596dc47646f1ed5f12781d5c23f4cab1670570dffc6ebe1409201c6e
SSDEEP
768:Wj+YbSVMqQzf+Qky8EjF8PfNWeUS2qz7iHCjMAAvTnJwDo9StM7h8JR8HFE:5YuVMqsf+Q/nF8Pgqz7iHCj/ATJ3IFJf
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ