DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
db483f2af5ecde76079b41ceb8683f5cbce391f0e1f88e482b6e047ef55f3c57.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db483f2af5ecde76079b41ceb8683f5cbce391f0e1f88e482b6e047ef55f3c57.dll
Resource
win10v2004-20220812-en
Target
db483f2af5ecde76079b41ceb8683f5cbce391f0e1f88e482b6e047ef55f3c57
Size
27KB
MD5
c1b08a6456bc1d4a9e979a5050f504ee
SHA1
a9b645b123159a707b76f0afe8dca33650867690
SHA256
db483f2af5ecde76079b41ceb8683f5cbce391f0e1f88e482b6e047ef55f3c57
SHA512
6af1e6a66b3c9c8a148d9c6005d6492683051b4e3fbc726d7f16783665fab8281b2cf1cd3077fed6f91b46af0bae064bf617b86d6247ef5c97d4a35add923366
SSDEEP
768:t5CKBqdSHQefh9f8eIRWL0yydGr9mhaEORI:tgqqYHQgURR20ye8ShORI
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ