DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
8651ab19b49634b0fabc7dc3b64d7c497e1f8ce0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8651ab19b49634b0fabc7dc3b64d7c497e1f8ce0.dll
Resource
win10v2004-20221111-en
Target
8651ab19b49634b0fabc7dc3b64d7c497e1f8ce0
Size
70KB
MD5
d06372f4435d1afb8306a57fe0ef669a
SHA1
8651ab19b49634b0fabc7dc3b64d7c497e1f8ce0
SHA256
83c49edb6df10024bc37aff7ae114b03f1222bf1c7bd7c656d493151617a41db
SHA512
8fe7a3fdef1116ce470c0a7e663b6e8ba0f38af671a72e6b6d012c35011be92d92d14e3bbfcbcc8c3820042559fa48ba933db4da4e0b369d1b74e5e51baa6668
SSDEEP
1536:taWbIwpEp4m3Iu0+LBYsGIdcPfEY6QO/us4w8aHb5+:taQIwpikY6sDcPfrOWjlG
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE