DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
8a8c19942ef163e5ff55c40c07d03093c416a699bdb1d3d6f7f7d2db5619b201.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a8c19942ef163e5ff55c40c07d03093c416a699bdb1d3d6f7f7d2db5619b201.dll
Resource
win10v2004-20220812-en
Target
8a8c19942ef163e5ff55c40c07d03093c416a699bdb1d3d6f7f7d2db5619b201
Size
140KB
MD5
54d7d94e90e4d03bb869b1cc402adba0
SHA1
f48431721c460521b10915454866cff36cbaba8b
SHA256
8a8c19942ef163e5ff55c40c07d03093c416a699bdb1d3d6f7f7d2db5619b201
SHA512
25fe1de8bb6ad8b56c7267beadf122ae0d1ca4c46bf14b465b2e1632469c9c7bbb7cd8e38b83a9813ab38eb4125194213d855981b4316227de5576ecc2a1288e
SSDEEP
1536:munoWt3AtjMHgCSdfKati742DRPF0h8k79Pl5E0HW6Eks04c3qWM:munntw9MwBToZRPFidkE4c3
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE