DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
fe69e1fcfaa594d524cdb00e5880b41dfda682a6c6a4207f0a405fe8de578e5f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fe69e1fcfaa594d524cdb00e5880b41dfda682a6c6a4207f0a405fe8de578e5f.dll
Resource
win10v2004-20220812-en
Target
fe69e1fcfaa594d524cdb00e5880b41dfda682a6c6a4207f0a405fe8de578e5f
Size
80KB
MD5
96599e43fb56a932788c4c27864145a0
SHA1
836eaf43354249086f181046df58e82c752dc4b1
SHA256
fe69e1fcfaa594d524cdb00e5880b41dfda682a6c6a4207f0a405fe8de578e5f
SHA512
a1cb2bc92799cd1886f9a9e0bf434b127c9a804b0d894b6bd8871b16e9ed85ac03ffd2769191155c1a6b8f5c9cef5f0f080dfdb8854239b4495a76d204ca6c8c
SSDEEP
1536:YVbuH9DI8TV8AFM1eXGQz2/bNI7l+GuxPx6IeeD4CyPagIErnlPXbV1Vz:YVbGNLFxXyNypuxbefEgRr9rV1V
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE