DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
aa6808f0ab8a6e4d0a685c0331d5d7c5c7a3c2514bfec6da65fdaed22725652d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa6808f0ab8a6e4d0a685c0331d5d7c5c7a3c2514bfec6da65fdaed22725652d.dll
Resource
win10v2004-20220812-en
Target
aa6808f0ab8a6e4d0a685c0331d5d7c5c7a3c2514bfec6da65fdaed22725652d
Size
85KB
MD5
d014076cba36326fdc175ea7d392673a
SHA1
acc12c3af5229ff08f6457b8d8740eefbfb48951
SHA256
aa6808f0ab8a6e4d0a685c0331d5d7c5c7a3c2514bfec6da65fdaed22725652d
SHA512
7bd75efa1c40eabc1512f9fc12ce980a9313a35f2c06d8f7efbe93d162a54b6f5d0b11cbbf0543c4c8d8553f12717fdd4ab3d10fc62286754c6020167e80d697
SSDEEP
1536:BthIfGj/LvXGdGWGn+XClTf17wZjqNTfsZQL3DGc5rK+fUbZXwYHrukA3Un+Xd:LefATvXcGWxGdkMBXL3DGr5wYSkA33t
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE