DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
2ba81a86309efe4feb0010251c92b6734bb15df3497e1198111d128066dee08c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ba81a86309efe4feb0010251c92b6734bb15df3497e1198111d128066dee08c.dll
Resource
win10v2004-20220812-en
Target
2ba81a86309efe4feb0010251c92b6734bb15df3497e1198111d128066dee08c
Size
30KB
MD5
0fae8239ae0029f676f7bdbc6601b437
SHA1
d3b0458fa72dc4f9cb4ce4eaa4e774079c77892b
SHA256
2ba81a86309efe4feb0010251c92b6734bb15df3497e1198111d128066dee08c
SHA512
0b1f32a2195c3ea6cccb63febf5902fb3093b7ee07bb6fc94e2c0a465f8acde5d9ad5e3af8bed0b75db3653e691c14ad27bfc2272d4919f3aff7ac20ff5efd06
SSDEEP
768:xKSqqu4u0GQPnOGbsOL7YhJPaJGf1H3tGrrbdPI:zqqu4u0GQ/TvAJPa+0bJI
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ