DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
358a93de3b50a306bd61ca0d61caf45fe2449f53.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
358a93de3b50a306bd61ca0d61caf45fe2449f53.dll
Resource
win10v2004-20221111-en
Target
358a93de3b50a306bd61ca0d61caf45fe2449f53
Size
69KB
MD5
19be67e0356a3a292eaccbf41db640bb
SHA1
358a93de3b50a306bd61ca0d61caf45fe2449f53
SHA256
f55797f046b1b04931b78bb085d18f620fab7a77472c7a571bebd10b1791304a
SHA512
b927c2783d86850866a7b71410da8d8d326baa2ec945b471eadd95ea88fe3f5991ca239b0ee5cae48feca6ba6f26f336ac61f8cf7472df50dafcf55f49ba47e6
SSDEEP
1536:0d7jipTa3sbm9e5MqwUT1cf9ndgWul5U4wUyDPQRoXktf6:0dvlOcqwN7ylw4RoXkF6
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE