DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
0a31fcf529f5b6fc20e25b9620452cc75849b0ee.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0a31fcf529f5b6fc20e25b9620452cc75849b0ee.dll
Resource
win10v2004-20221111-en
Target
0a31fcf529f5b6fc20e25b9620452cc75849b0ee
Size
70KB
MD5
418cdccf4d2d28b87a689289b36cc87d
SHA1
0a31fcf529f5b6fc20e25b9620452cc75849b0ee
SHA256
a6826956001af1a952d44211902eaa0ff2e584ec6b73ad317f7b44875d8af67a
SHA512
2766c5e134f7ca8ad2815579d65a3de5b063db6fef8b2ea81f4ea768f279006e1d8b3f8653876b993fb4476019e8119a056805c25b09ae74d642267f12c8ea7a
SSDEEP
1536:9q/K7wcmf/ZY7rQtvQO5hsplA9i2OA22D3F+IgCvWU53I:9qiEck+7rQtvRsAsiPf
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE