DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a410e09c3dec1675e4b5405ed8710310ee8410f1d186a0604b03cb796d422a0c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a410e09c3dec1675e4b5405ed8710310ee8410f1d186a0604b03cb796d422a0c.dll
Resource
win10v2004-20220812-en
Target
a410e09c3dec1675e4b5405ed8710310ee8410f1d186a0604b03cb796d422a0c
Size
30KB
MD5
e15c69bc96f578659c578835b24c9860
SHA1
628472e038b5164a516ed02553f18008bebfd04d
SHA256
a410e09c3dec1675e4b5405ed8710310ee8410f1d186a0604b03cb796d422a0c
SHA512
011b79ef42d25fab9d519bc1588739b6812447697f2df00ef48314907c18052ba60279f6ac01675e1bcc2374ad53895c2ed31da739739bec526976eb442d1b66
SSDEEP
768:xKSqqu4u0GQPnOGbsOL7YhJPaJGf1H3tGrrbdPC:zqqu4u0GQ/TvAJPa+0bJC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ