DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a4d6c7c1a47635635e902025fbbd3fb374e0e621cbcd7b7ac7510353c823c6cc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4d6c7c1a47635635e902025fbbd3fb374e0e621cbcd7b7ac7510353c823c6cc.dll
Resource
win10v2004-20220901-en
Target
a4d6c7c1a47635635e902025fbbd3fb374e0e621cbcd7b7ac7510353c823c6cc
Size
86KB
MD5
6e5e187232c9ada834e7e01a1f39d760
SHA1
b2ddffc86939e04854de8fc79dbc28e42fc95fcb
SHA256
a4d6c7c1a47635635e902025fbbd3fb374e0e621cbcd7b7ac7510353c823c6cc
SHA512
8c9276770e0a45d85d8a6ade7acece55260c5161fe45195b99ba93bbddc5838cc15d7582e2275487cad15632c85116e34fe76e0ac564fd30144859eeebf509ee
SSDEEP
1536:8eLSJ7KI5ybXuTmZymFdKEn2lsBx6/vX2VVAueGOXP9F+8BDMmUS/bd3Oq/yAaIR:DYx5ybXhvdKawXEJe3FFoczdhXaR+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE