DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1256d6b9cc24b3d48f0a4e1bfe92d1d5c972c76c1eed20b9d7ed0911f4d53125.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1256d6b9cc24b3d48f0a4e1bfe92d1d5c972c76c1eed20b9d7ed0911f4d53125.dll
Resource
win10v2004-20220812-en
Target
1256d6b9cc24b3d48f0a4e1bfe92d1d5c972c76c1eed20b9d7ed0911f4d53125
Size
42KB
MD5
1813acaf70c96c64b43c67f3bb3ff010
SHA1
bd348ef23e9c912408a8bac4f75e57d2f9bf618e
SHA256
1256d6b9cc24b3d48f0a4e1bfe92d1d5c972c76c1eed20b9d7ed0911f4d53125
SHA512
5369f7354c060125173e22ef64a803fe7514dd50d012058fe6834481e9e5a3f32791282542237838219b0d86f50aaa3761a578301c14edcefd4f0ddf16f9a3d9
SSDEEP
768:/UeJ4cBPnm18tC242plP++bSRI1q0W5Ze5IfBSiLHFc8unzNIwpRzmdu5LxUkv8x:/Mchn08tHdR++bOIp5yBS8ypIwHxlRP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
SysFreeString
WSACleanup
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE