DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
7141fe75ae1a0f66a63e6a3514dffc7710dd9afa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7141fe75ae1a0f66a63e6a3514dffc7710dd9afa.dll
Resource
win10v2004-20221111-en
Target
7141fe75ae1a0f66a63e6a3514dffc7710dd9afa
Size
70KB
MD5
0b4b5ff2c0078d6f670d65ff615578a0
SHA1
7141fe75ae1a0f66a63e6a3514dffc7710dd9afa
SHA256
1f23bae2c0ad7095aa9e7f4ded9f6dbca1922d2d9173ee5f02b282bd7114eb56
SHA512
a2b503c56563fc0f23286e03c526cad7fc59aab75b4dd0c11f7ce99a7f8a7f306a712ffc4db5a9f7fbafaed80b6872e92146b5f9240074880031aeddd3d417d8
SSDEEP
1536:6AskjtybBTcR+LyWR3ELVpsyiBVRD1uuRh2FBCEtuF4/md:6Ascybq++fEVx1XhG1id
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE