DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
eafe7f07a33c02edc06639db150a8f77fa6a644e54632bc1be5f9a9c49d1cea6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eafe7f07a33c02edc06639db150a8f77fa6a644e54632bc1be5f9a9c49d1cea6.dll
Resource
win10v2004-20220812-en
Target
eafe7f07a33c02edc06639db150a8f77fa6a644e54632bc1be5f9a9c49d1cea6
Size
512KB
MD5
1371e72b9d2626cdaaf47c6e72768b10
SHA1
646f94304ba5db71347788c0bcbc1660eac1f964
SHA256
eafe7f07a33c02edc06639db150a8f77fa6a644e54632bc1be5f9a9c49d1cea6
SHA512
85fd1344ca5de45d1ea5dfda3037cee8f1d200bf9d2ecbea0c0cedac10bc3f6617551adf9ab8da4db8d8883dd03cc1a14d92602658ffa29f74a135ad25180fec
SSDEEP
6144:v8tRpyP0Y7xDMgGsJZIFcmB1q23XtjKzXkBx8Nk+DpJIrerd8S4i8jBUQjXh9aGR:U87CuIFJqGtjKbkBCl2rjh0GG5m
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ