DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOn9
Static task
static1
Behavioral task
behavioral1
Sample
b21c601087b1e29c5b3cac794d3b7216fedecd70c0d44bbb99e806e2cc67b0e5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b21c601087b1e29c5b3cac794d3b7216fedecd70c0d44bbb99e806e2cc67b0e5.dll
Resource
win10v2004-20221111-en
Target
b21c601087b1e29c5b3cac794d3b7216fedecd70c0d44bbb99e806e2cc67b0e5
Size
152KB
MD5
a4c8383c16969164722b724e64a3c064
SHA1
0fb1248d98d74b7859b787983471814e00e6fedb
SHA256
b21c601087b1e29c5b3cac794d3b7216fedecd70c0d44bbb99e806e2cc67b0e5
SHA512
bb3249b8329442b67bafef2990a8318fd2ddaff5acd8447eff8cbfa5a8f53d71aaa848b83d37ab9069c6fb796af651f055cd7f14c8191730d6ef08f111638b39
SSDEEP
3072:gSgCeNPVZdldh1QIpLI55mRICU6YFFe8v3A3SrkNDbr1ZNc6MZkCj8j0/7i5LYIo:+D3Jk6/gv3WSrmi/gj0m5k
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOn9
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ