DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
5bb8cb24546fbf2e3753605127563d3456f45104f75741c18a6ea7fd6eca3e34.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5bb8cb24546fbf2e3753605127563d3456f45104f75741c18a6ea7fd6eca3e34.dll
Resource
win10v2004-20220812-en
Target
5bb8cb24546fbf2e3753605127563d3456f45104f75741c18a6ea7fd6eca3e34
Size
91KB
MD5
79f71c3c70178b9a3314094ae0d9bee0
SHA1
9b9ce17de0f65655be6ae2346eb325e66c6cae10
SHA256
5bb8cb24546fbf2e3753605127563d3456f45104f75741c18a6ea7fd6eca3e34
SHA512
7272ba090bc77b4cbb55606b6698c45d79436d09feebc301b598115815cb254a8f492aa14cf27493d1820df18012fef82289c8f077d6fd1deff41ab694601101
SSDEEP
1536:InhUoOavPR8sCgNuJYLS8fvAah/Q17Hwk+sBz/+x6f5w+m2XcyHIXOjX5lfvL:InuoOAPgCSaQytgz2x2XVHIXmn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE