DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff9
JmpHookOn9
Static task
static1
Behavioral task
behavioral1
Sample
d119ff862d1becf9842b240ac592c6f87a34fed7c16d64272fdd297f9d2ec8c4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d119ff862d1becf9842b240ac592c6f87a34fed7c16d64272fdd297f9d2ec8c4.dll
Resource
win10v2004-20220901-en
Target
d119ff862d1becf9842b240ac592c6f87a34fed7c16d64272fdd297f9d2ec8c4
Size
146KB
MD5
fce25647213b1c51dd0a5f250f95def7
SHA1
bb83692d4aa010041485c7aec2f876844c26b633
SHA256
d119ff862d1becf9842b240ac592c6f87a34fed7c16d64272fdd297f9d2ec8c4
SHA512
7ef010ef0f92184d00fa8411a33fba598115b8f98a788d699f979876eff50784036f20e5dd9ddef56e6230b3f4ff07955dcd694b71b8f2436e4dfff4c5c1e88f
SSDEEP
3072:vs13rImKSKWPLJF30L75djTP+QkEEzGbEmgK5SwKxILnZ7XMvHz7jXWIr3gls:G38QkqMxZyOKbWls
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff9
JmpHookOn9
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ