DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
69317da6ece10549a798a2cafb637a3bac802b57c7e8333a7cc8bff0e03f76bf.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69317da6ece10549a798a2cafb637a3bac802b57c7e8333a7cc8bff0e03f76bf.dll
Resource
win10v2004-20220812-en
Target
69317da6ece10549a798a2cafb637a3bac802b57c7e8333a7cc8bff0e03f76bf
Size
20KB
MD5
0bd0d34ff6d7933d23c1ce8598cdeb20
SHA1
e3417c6d83c5f75a8681960b3902b3a555e27349
SHA256
69317da6ece10549a798a2cafb637a3bac802b57c7e8333a7cc8bff0e03f76bf
SHA512
28cb39562d8dfe71ba707fdf4f7ad0e5bc662a1cea399e2fffa1648ac0e0ae1657f8263b9f8ac7f3827bfe908d5ff6e8086d8b565d1f6e6306324b5dbb71d833
SSDEEP
384:/s9iDXTJt9BCMcKEU/OKURQpmSQGibuEm57heV/WuvNDFlvOg8YF1XqB:RJIMzEUGpRQoRr6EmGRW6yPYvS
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE