DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
bfeb2d9ac3ba2ac9ca4248c1cdb9d69235b4ae7c4f5a8997a979addfea989899.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bfeb2d9ac3ba2ac9ca4248c1cdb9d69235b4ae7c4f5a8997a979addfea989899.dll
Resource
win10v2004-20220901-en
Target
bfeb2d9ac3ba2ac9ca4248c1cdb9d69235b4ae7c4f5a8997a979addfea989899
Size
77KB
MD5
797f1719c01314344411646db13107bd
SHA1
8aa95899af5cc214a2619597f64c974311ccc6cf
SHA256
bfeb2d9ac3ba2ac9ca4248c1cdb9d69235b4ae7c4f5a8997a979addfea989899
SHA512
c6d16c5afdeb1abaa606ed7846518ec76c29039a583887eeace88dd5573a95fef6a52d99e031e3b9f8a61033db35b1b979e84bbd2353e9080ab30e0aa2adc64a
SSDEEP
1536:XtMqaObQ7t4WD98DOGiHCj/AWUBuf3QF/YMPZuXIkVPsjs2M5/:d9iDyqvUf3QF/1AXIkVPsI2M5/
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ