DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a59fb350d24115091efc0eebac74f2a4c083abd95cf5a9c0e82fcbaa2fc2b0ff.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a59fb350d24115091efc0eebac74f2a4c083abd95cf5a9c0e82fcbaa2fc2b0ff.dll
Resource
win10v2004-20220901-en
Target
a59fb350d24115091efc0eebac74f2a4c083abd95cf5a9c0e82fcbaa2fc2b0ff
Size
36KB
MD5
2c192f39e6053c380e11a636a34470db
SHA1
2d4218df3547bb6e77cb869f6d6a7ffd715528fc
SHA256
a59fb350d24115091efc0eebac74f2a4c083abd95cf5a9c0e82fcbaa2fc2b0ff
SHA512
f028cc2fbdd70743c7eedca69088e813fe45b1f2ab6fdd922cc4f5c3903e78d43cdc273c0d43ad0249e8a14ad7d08cae8fd883ce643b1e8adb1ef272d72d3023
SSDEEP
768:xnQoi6qZOMQOppiIlSbiVVSIxRQW7Zd1UKdQw82rea/Ip:VQv6qZpQcbVAIr3XC2nea/I
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ