DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
afe5488a52d4ce52ef5eceb83057cb84d9cee6afa10f590d543b727bd44f466d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
afe5488a52d4ce52ef5eceb83057cb84d9cee6afa10f590d543b727bd44f466d.dll
Resource
win10v2004-20220901-en
Target
afe5488a52d4ce52ef5eceb83057cb84d9cee6afa10f590d543b727bd44f466d
Size
59KB
MD5
e91b93718963ea09bb1ce5dd544712ca
SHA1
32dfddf725179943856315356bc71b0ec6d935c2
SHA256
afe5488a52d4ce52ef5eceb83057cb84d9cee6afa10f590d543b727bd44f466d
SHA512
9058358e4741c9820c1c896fdb82a52b2b1b80eea8d17d3e8983b5b378afaf393685a7e0f41505ded8d3026a36bfc3f5858ff8b3c474963f796b09da758829b8
SSDEEP
768:pKzyJlnwZoT0Tp6eU1Le9ZBm+OPWvMBSubLHW1Aaz5z92fd4PNjWmxS9YdGt6g:pIyLwZoel9ZBt3UiZ9z9CdSNj9dG0g
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE