DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
6fcb3fa9ff994feb909e690edf75276d70d0d6ab3a71fe866abd563f7a3b6d45.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6fcb3fa9ff994feb909e690edf75276d70d0d6ab3a71fe866abd563f7a3b6d45.dll
Resource
win10v2004-20220812-en
Target
6fcb3fa9ff994feb909e690edf75276d70d0d6ab3a71fe866abd563f7a3b6d45
Size
140KB
MD5
419fcb94544a63e5cadf0fd8e9155cb0
SHA1
b1588d169b09bf4ac690dc03b7f11dfea7ddd1b7
SHA256
6fcb3fa9ff994feb909e690edf75276d70d0d6ab3a71fe866abd563f7a3b6d45
SHA512
e41c84802d6d93033cad907d026395a3cb2e30c3ddbdcdff05fce87cfa0c4d79994067e0a508f696ef61f9647ee6de38d2533f90ebc6e16666ab126240a6851f
SSDEEP
1536:okV5jHIpZkg5hMNdTaurRPF0h8k79Pl5E0HW6u/wWJtDD2w:hV5SLwdTrRPFidknIWX9
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE