DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
613064482c29e28d91d6fa1cc4009d6f66a92404.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
613064482c29e28d91d6fa1cc4009d6f66a92404.dll
Resource
win10v2004-20220812-en
Target
613064482c29e28d91d6fa1cc4009d6f66a92404
Size
70KB
MD5
bb27eca3f62d1d38e754b311cff99fab
SHA1
613064482c29e28d91d6fa1cc4009d6f66a92404
SHA256
7231d75adcadf4142c16a322a29d696f7c57c1c9118f0fbfba3488b1af3a459e
SHA512
3c9a34a1b19dc013944c65cae9712d48e4fac3171bfe5b71ca4e9ea4dfc1f8524eb7220660e48adcae10dab15f34f6fee075d826fa10cd05470d26d4e8b3db7f
SSDEEP
1536:unzMBrflJSctm/J0nztbBzQY3Z6xy2ObCm4XTLCGEOCBPhz:unzC5taWN7Z6ktbKXHCGGPN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE