DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
d0d8647697b8c671b276a9c9183790e81e42e0dd0269d271c752a55af43e7a2c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0d8647697b8c671b276a9c9183790e81e42e0dd0269d271c752a55af43e7a2c.dll
Resource
win10v2004-20220812-en
Target
d0d8647697b8c671b276a9c9183790e81e42e0dd0269d271c752a55af43e7a2c
Size
36KB
MD5
cfa1463c91f3b3c0edf752d03c1b69c9
SHA1
da356c0d25ae2764087c665e7b95cd8db2ffdf33
SHA256
d0d8647697b8c671b276a9c9183790e81e42e0dd0269d271c752a55af43e7a2c
SHA512
f024209cb93da5971592d10e3ec86bb182463be154d0f1e8b7b98acf5d094c05020c05b952a1ee11805970297a900128e1f85cef3bd8a58bf039843935f1e06f
SSDEEP
768:zQoi6qZOMQOppiZaOiqjC3mKnuZbcUKdQwr28w:zQv6qZpQc3IKuh32
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ