DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
c65bbde996f9dabd5eb850c8cdc0ff8940031c0798b7c456915a3cad8a67ecbb.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c65bbde996f9dabd5eb850c8cdc0ff8940031c0798b7c456915a3cad8a67ecbb.dll
Resource
win10v2004-20220812-en
Target
c65bbde996f9dabd5eb850c8cdc0ff8940031c0798b7c456915a3cad8a67ecbb
Size
76KB
MD5
cf77b182e382503861f7286e47850436
SHA1
9c3700ba660246380bc1357fb70aba2d034338a3
SHA256
c65bbde996f9dabd5eb850c8cdc0ff8940031c0798b7c456915a3cad8a67ecbb
SHA512
8e33cde395cd508a6dd091ab0d3a6b4083ee44dd1d56aa38c72837e5b9f3f84e94107e57028cc8b7050ad31ba4117f595149f87e2e307ae0c9e129acc37ffe30
SSDEEP
1536:fyqvQQ3NlLLvbLS1raiHCj/BDnGYtv2zqmblsG+a:ZP3jL37nDnkzqmKa
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ