DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
5b26080dbf61366bf2374523a88d6f1c5fa54f8d72e8ef36b337e2fcf54ea6e2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b26080dbf61366bf2374523a88d6f1c5fa54f8d72e8ef36b337e2fcf54ea6e2.dll
Resource
win10v2004-20221111-en
Target
5b26080dbf61366bf2374523a88d6f1c5fa54f8d72e8ef36b337e2fcf54ea6e2
Size
30KB
MD5
133623f77fc9208a95368f28392360df
SHA1
09607f5d90672fd2f229dea3c437a512ce0b3238
SHA256
5b26080dbf61366bf2374523a88d6f1c5fa54f8d72e8ef36b337e2fcf54ea6e2
SHA512
22800e67aa3fb8e4b9213f02cf486c547bf39106166037d8e5cd5987fab1dc9b2cd4e8d4e7cb86060796a68d7e080937191a714b3a7418a3e10b5660cd432e06
SSDEEP
768:xKSqqu4u0GQPnOGbsOL7YhJPaJGf1H3tGrrbdPF:zqqu4u0GQ/TvAJPa+0bJF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ