DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
afd9a714d10666e58ee54d42a94f842ddccd0fd3ae7d8d90351ee76887851bb2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
afd9a714d10666e58ee54d42a94f842ddccd0fd3ae7d8d90351ee76887851bb2.dll
Resource
win10v2004-20221111-en
Target
afd9a714d10666e58ee54d42a94f842ddccd0fd3ae7d8d90351ee76887851bb2
Size
38KB
MD5
e7ba416ba8ac33f67b852566850a32d9
SHA1
d6a32fd2efd4615ac73eb91c4f4eafab10eb9482
SHA256
afd9a714d10666e58ee54d42a94f842ddccd0fd3ae7d8d90351ee76887851bb2
SHA512
8ac1723120b26c8c68eb98ac5b2f2d3060cac96329157cab730a66d80cebe114105a88cf8dfbdc51fa07336961b04dd0f810567ddc06737422df61b93775a49d
SSDEEP
768:FhyqqDQ+5pCJXX25iXw+n+PqfFKZOi2AukbpWrq8kehXdQw62f:2qqDQcQHuown7uFhN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ