DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
86f6c650e7d825f765230f1503b51ce952e7fe123e1ef71af0f708f1b849529f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86f6c650e7d825f765230f1503b51ce952e7fe123e1ef71af0f708f1b849529f.dll
Resource
win10v2004-20220812-en
Target
86f6c650e7d825f765230f1503b51ce952e7fe123e1ef71af0f708f1b849529f
Size
37KB
MD5
a042420164c6325b9ac81b72845dde6d
SHA1
7a0026e4c7151889101b75267e7c8f16114cae83
SHA256
86f6c650e7d825f765230f1503b51ce952e7fe123e1ef71af0f708f1b849529f
SHA512
b4d325caed03b767a24bf332312cea77b8fc23f502ffd25f61d9503012b44164c04a3b7d326c66839043a9c7c4431277547c254774fadd02367b78dbc818ed87
SSDEEP
768:2ySq6QypcpT5uAiHCjMA+Sq/gtDNplPQkAcSyPcImTi6:hSq6Qr1iHCj/+Sq/wN3u+p6
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ