DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
aad67bd021107ce8bd8d7b6ec6ff56f399342e8f9696ec13590a140155bab328.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aad67bd021107ce8bd8d7b6ec6ff56f399342e8f9696ec13590a140155bab328.dll
Resource
win10v2004-20220901-en
Target
aad67bd021107ce8bd8d7b6ec6ff56f399342e8f9696ec13590a140155bab328
Size
167KB
MD5
8616ddac4e64d811cdc5ac237c94e75c
SHA1
224ab4ad138b219260ff5891ef1e47b80b6de306
SHA256
aad67bd021107ce8bd8d7b6ec6ff56f399342e8f9696ec13590a140155bab328
SHA512
513e88ae124b3a77f274e1a7a435e3726000f50d0cb64c21cd0ef6736790412bc676ab14cee33ccdefaa71cbf0e5c845ac6da926b90fba6cc94eccf0cddd6c40
SSDEEP
3072:4QCp63iKBtWRUYzt0QQy+xLV6KCza9g21Vt:BCpAiKPWRVt0QQxh6KCzauot
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE