DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
95e41a55bd61cbbdb485cf798d715fb049d7a401f7a7971e5d7cec015b6c9f07.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95e41a55bd61cbbdb485cf798d715fb049d7a401f7a7971e5d7cec015b6c9f07.dll
Resource
win10v2004-20220812-en
Target
95e41a55bd61cbbdb485cf798d715fb049d7a401f7a7971e5d7cec015b6c9f07
Size
81KB
MD5
6a65bd6676d726c7b1f3361e2f83d790
SHA1
b958da0f9d57f16d1984355999f79ecb0f049176
SHA256
95e41a55bd61cbbdb485cf798d715fb049d7a401f7a7971e5d7cec015b6c9f07
SHA512
7a29ee5ae4f2b8df3ff76c1a99f37bb6b50d6623f586f61b1ca33191be4b920c452b60fd5ad75e0e8e0f5d4f9788d0dd9247ccf5f89f50188d8162ad908be8da
SSDEEP
1536:FJwx7kd6rzebN1+HzoqYcCdUq21vBGo+qux+35Y6:FKyQr67I/ZuUq25+Txo5F
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE