DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
f5e8668febf72ccef9a5bcc8dc882871e8cdd9af85e7e95e7524893509c0da7a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5e8668febf72ccef9a5bcc8dc882871e8cdd9af85e7e95e7524893509c0da7a.dll
Resource
win10v2004-20220812-en
Target
f5e8668febf72ccef9a5bcc8dc882871e8cdd9af85e7e95e7524893509c0da7a
Size
77KB
MD5
cdc650c7e2ded9bd811f2a842a2aad62
SHA1
12e18f21656a60d081d968313324c67b85425e29
SHA256
f5e8668febf72ccef9a5bcc8dc882871e8cdd9af85e7e95e7524893509c0da7a
SHA512
72c100e694814c52bffe2ddcd326c61e38d7fde7ef07a1c7391922e0334c20e3b582735f1b3c1619acc356750e56c3c0eb4881976cf85d1f36b8058313634654
SSDEEP
1536:aJKNqQVuiuwtdhBaWvos5QvXn0OnSoXVhZUA8jJdYIpX3ospWGOgdc:0qyq3fAs5QvXn0OnSEVnx8jzhAgu
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE