DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
d07cb442f1b95b159e93dcecf8049b777e6bd06926fdfd2b8e795f845c5b070d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d07cb442f1b95b159e93dcecf8049b777e6bd06926fdfd2b8e795f845c5b070d.dll
Resource
win10v2004-20220812-en
Target
d07cb442f1b95b159e93dcecf8049b777e6bd06926fdfd2b8e795f845c5b070d
Size
23KB
MD5
d08f49fb068433e8cfc6e8bbd6b578e8
SHA1
6f916a64bd85b1e48a0878bbadadac88f2166d23
SHA256
d07cb442f1b95b159e93dcecf8049b777e6bd06926fdfd2b8e795f845c5b070d
SHA512
4cca01cef692464dd7fd386246d949b331c831747dd97d7a71a653fad0075ea17583609caacbf2fde7f3169656d9b0a698749b1e7db214179738cd19bc621e43
SSDEEP
384:XO9xz0CX0pqd+1ijQmZzdxVa3omF+3wbtP6iYwOmm7wdDAzBKmktc:+cCXEqdSQQS7SIgXYijdsBt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ