DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
f85b26b273a052306b94c2045831b2cdcf58ab8d5c4c2aaafe2ade103ac196a4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f85b26b273a052306b94c2045831b2cdcf58ab8d5c4c2aaafe2ade103ac196a4.dll
Resource
win10v2004-20221111-en
Target
f85b26b273a052306b94c2045831b2cdcf58ab8d5c4c2aaafe2ade103ac196a4
Size
159KB
MD5
57d32241abb49cd2588a13f9da2ed339
SHA1
2d438220700bc2a4ab2d13299a7b282f36982fd5
SHA256
f85b26b273a052306b94c2045831b2cdcf58ab8d5c4c2aaafe2ade103ac196a4
SHA512
5774f8c9379d617ab9e28484f3c21e7b451c11662172e53cb9cbe0341ee6a00601de2966674849ca72b3fd13e484afb2b36710cc137ef786bee602b5b476f4ec
SSDEEP
3072:Terusl/8vtsFia2FQXebWu1ABPWcqreKty:6rv2KFiNJAwpr
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ