DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
fb7ef62e2e5d2279934a5a1c9f54a79752208726230a018200d0e9652e0517b4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb7ef62e2e5d2279934a5a1c9f54a79752208726230a018200d0e9652e0517b4.dll
Resource
win10v2004-20221111-en
Target
fb7ef62e2e5d2279934a5a1c9f54a79752208726230a018200d0e9652e0517b4
Size
54KB
MD5
77c74607c7e9b95c420c7eb9ac3dd763
SHA1
500bc5c62060514b72febda6671a4fb9228fdb3d
SHA256
fb7ef62e2e5d2279934a5a1c9f54a79752208726230a018200d0e9652e0517b4
SHA512
e59b608f48f92c3088157b0f537ad0d9ef127ea95a06e9769cafab99d538d25e8ee005ac25972f1f67efa70eea84986ed9e7d7af194787d15d169bd7d00e62f5
SSDEEP
1536:TkqyQLGj5N0PQYPiHCj/T1gCzS9qUeJRLj9:SUGsHV+CzS9qPRf9
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ