DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a83f962b28ee9e38c5988ccd062f2322461a419bfc435afc62791f341986e790.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a83f962b28ee9e38c5988ccd062f2322461a419bfc435afc62791f341986e790.dll
Resource
win10v2004-20220812-en
Target
a83f962b28ee9e38c5988ccd062f2322461a419bfc435afc62791f341986e790
Size
51KB
MD5
e7ee845140e6c257282ccbf5b5d3e7fc
SHA1
0d981967320ec5c04cba8257d08e567561ffa298
SHA256
a83f962b28ee9e38c5988ccd062f2322461a419bfc435afc62791f341986e790
SHA512
16a9be4540b5bb041b90c2868c36abf98d3d255d0687232760d27f74b4dc947bf96c3d854e5b3536f28cc76d430e117e38e55e6c56f0c4a7a75e06c7eedb696e
SSDEEP
768:4wamC6+wXgyq1Wwue0MqCric8Eja6d1B2BwwzuIv5hnYdkmOaLbUN3tFFZ:DT+E4Ww7yDvyIJBhnqlOanUPZ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
SysFreeString
WSACleanup
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE