DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1bffbac49f5ce223a241da2c3c30cba6288867308de79e0eb73380a5d268f9d5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1bffbac49f5ce223a241da2c3c30cba6288867308de79e0eb73380a5d268f9d5.dll
Resource
win10v2004-20220812-en
Target
1bffbac49f5ce223a241da2c3c30cba6288867308de79e0eb73380a5d268f9d5
Size
25KB
MD5
f455638fe4ac5542255e8693240c1340
SHA1
881bd1cbf4cb62dc2a5046decaf30a1c8fa5f94c
SHA256
1bffbac49f5ce223a241da2c3c30cba6288867308de79e0eb73380a5d268f9d5
SHA512
7c6c43d88c2bdff6140fb812711aac7560238f5b00f747676d9873bd100c6bd518913c24770a7b85db1e5d7c9d4a8abe938e6f97e06944d45994bdc60b85a1c9
SSDEEP
768:jd2f4FqpGsaHJRKD7vAXM+qT6AZfe72dOgxEbDk:jd2QspKSD7ACrfndzT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE