DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
51efba9033000f9149a1209203f9e6a5952d4ca748300786a0c9661d0db011a2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
51efba9033000f9149a1209203f9e6a5952d4ca748300786a0c9661d0db011a2.dll
Resource
win10v2004-20221111-en
Target
51efba9033000f9149a1209203f9e6a5952d4ca748300786a0c9661d0db011a2
Size
36KB
MD5
2a31ad824a48a16980109e955d3c8780
SHA1
6f4b5f0d6e52890619bc6291d9abc7a89424f638
SHA256
51efba9033000f9149a1209203f9e6a5952d4ca748300786a0c9661d0db011a2
SHA512
caff65c6d7b46ad3160b72b240b98fce48d8895098d60c6bdbed328a5c3afc9d6b08a2d7ee1d4971b43dd563c7e5026f3a220f706755c3147b896d7fbb0db857
SSDEEP
768:XQoi6qZOMQOppiMaOiqjCZgKnuZFTAJUKdQwr28:XQv6qZpQcoIKuXAe2
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ