DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOn
Static task
static1
Behavioral task
behavioral1
Sample
9364ede506a68a115ac3c317e4e8f7a0f8ba7a952a68892cf0852532fff86ac2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9364ede506a68a115ac3c317e4e8f7a0f8ba7a952a68892cf0852532fff86ac2.dll
Resource
win10v2004-20220812-en
Target
9364ede506a68a115ac3c317e4e8f7a0f8ba7a952a68892cf0852532fff86ac2
Size
116KB
MD5
51fcd9e65f34a72e74a2807d4ac9f790
SHA1
2d5226ea3381d0a53d90f0ed8dd1e606203616e7
SHA256
9364ede506a68a115ac3c317e4e8f7a0f8ba7a952a68892cf0852532fff86ac2
SHA512
e9abb6ecf45b7d46b055ccddc96d66a4b71247352aebb0b9bd28ba8c3ffb08b5a47a83377ff2f69f41ac587f5848875b062cbd20e67a82a87bc436779a05305f
SSDEEP
768:JlyaqDQj1E0dBlUYoa+71rVPHIL+nO1bLa722VJlsM2A6XsyaGDcBfbM:OaqDQXn2rV/IL+Mby5baA6cVGDmjM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE