DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
d915a0350c2e3b5285f892e86c755e9cfdf42df7df84e12d004e7bb041125280.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d915a0350c2e3b5285f892e86c755e9cfdf42df7df84e12d004e7bb041125280.dll
Resource
win10v2004-20220901-en
Target
d915a0350c2e3b5285f892e86c755e9cfdf42df7df84e12d004e7bb041125280
Size
36KB
MD5
449da32bd13f6adadb57c290d0e6b262
SHA1
23466ef8cd1608018acba14fc0b0429980bfec91
SHA256
d915a0350c2e3b5285f892e86c755e9cfdf42df7df84e12d004e7bb041125280
SHA512
2c6a8f4d702e8125220be2c3753c6bbff5cb2a13aa0189e8bf4312fefa85c467d4e1eb75b49f30807dc8661522dbcd4502fbcae57c273411801b89a2433f679f
SSDEEP
768:4Qoi6qZOMQhXl3V9OvS5xlxknq0w5UEdQw7yTd1:4Qv6qZpQjYmnxkqTOYYd1
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ