DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
92124fe74522fe74e02cfc00c54c8dfe9156119091ce3db0509312152520c8d2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92124fe74522fe74e02cfc00c54c8dfe9156119091ce3db0509312152520c8d2.dll
Resource
win10v2004-20220812-en
Target
92124fe74522fe74e02cfc00c54c8dfe9156119091ce3db0509312152520c8d2
Size
85KB
MD5
321ee307ff59c64f6f1ce60774b3c310
SHA1
630b27da0789027529fc64a2645411d523b8b5ba
SHA256
92124fe74522fe74e02cfc00c54c8dfe9156119091ce3db0509312152520c8d2
SHA512
135be0fef7a85d6ff44b15001118ffe71f2fef0ddbc282bca891dede215c986957a24813aa38a5135561348808c10bb9cf5479cfaa0972842e01ae19c3a78131
SSDEEP
1536:TUjTpjMKgKvC2qioi1qDvq6nbrOZuCTMPzjxXQGblyU:TYgsZ1WvJnHOvTMPhbB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE