DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOn9
Static task
static1
Behavioral task
behavioral1
Sample
d36932b62e077f336b40f6dca525611b8cb7aa54d598d31e32cea911a654a532.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d36932b62e077f336b40f6dca525611b8cb7aa54d598d31e32cea911a654a532.dll
Resource
win10v2004-20221111-en
Target
d36932b62e077f336b40f6dca525611b8cb7aa54d598d31e32cea911a654a532
Size
134KB
MD5
1e78d3043cc218b9d8af929bc7f9d74f
SHA1
ec1576e8aeea41abef12bdfc53f1529ac1e46037
SHA256
d36932b62e077f336b40f6dca525611b8cb7aa54d598d31e32cea911a654a532
SHA512
9c825afb5bf0b4c96267fcbea6eb9644a81afd27235f678b7db26169305351d7f9ba605e1966cd6ad0806e4b8543f09eaef612e1317adf3ece8f1fec70c48144
SSDEEP
3072:CvUn8ndD2T57MFuFu08I9/ZOJIwf7s/nI1P8jPoyHJ13jRd4vIp:6UnnJPFbOJVJ8E0P
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOn9
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ