DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
93b9dffc6a4ca1a0c2081c18330d4c39305b2e305aac99699d785c5ad31eaa7e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
93b9dffc6a4ca1a0c2081c18330d4c39305b2e305aac99699d785c5ad31eaa7e.dll
Resource
win10v2004-20221111-en
Target
93b9dffc6a4ca1a0c2081c18330d4c39305b2e305aac99699d785c5ad31eaa7e
Size
158KB
MD5
5c3f163eafb565045eba52bc3bc6cdd3
SHA1
3e4f1a427621c110078cb5524fc827ae3b22f8e6
SHA256
93b9dffc6a4ca1a0c2081c18330d4c39305b2e305aac99699d785c5ad31eaa7e
SHA512
e109ff8e7db1194f864f455b0c81cfe514bd42774e4dc257e1eea775ec2b2bf78be8a8cd39aca3d30534769d39d0ae8733ba47112380e3de0c41ccd493f14088
SSDEEP
1536:iXkf6t07Qu0EE5mm+M8vx3GPuCcKC2Gk9E8CmXCTETBbmPNQP2qc0:iXd0qAvlsuCqWZCmSoTZmPOO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE