DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ffb1787f0bf721a19267445c0de15b5d61f83198a2a29117bc5ec1b0fad7e89a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ffb1787f0bf721a19267445c0de15b5d61f83198a2a29117bc5ec1b0fad7e89a.dll
Resource
win10v2004-20220812-en
Target
ffb1787f0bf721a19267445c0de15b5d61f83198a2a29117bc5ec1b0fad7e89a
Size
89KB
MD5
3b0551c5a65a8f8c0f9e694da0dc8800
SHA1
d4bf3f3a7b6606f19df042ccf4c72d6f0658ed0d
SHA256
ffb1787f0bf721a19267445c0de15b5d61f83198a2a29117bc5ec1b0fad7e89a
SHA512
0188b32bfb13ddb4e4220544ee60693684cfba30dd2512ae7943efc0184465c033cecb23f61216d00c1023b5e19b975ff850b95f5b994392a49b103a98992825
SSDEEP
1536:/PgRwZEfHySJAe3KC09COqGHpRyPZzuNdbF/YvLdJnQ31:BrSJNYqKePZzunbF4JnQl
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE