DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
bea33b99c50ac6aebb8682c8e435b7367e4aa805b900844b5138ffdd3108746f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bea33b99c50ac6aebb8682c8e435b7367e4aa805b900844b5138ffdd3108746f.dll
Resource
win10v2004-20220901-en
Target
bea33b99c50ac6aebb8682c8e435b7367e4aa805b900844b5138ffdd3108746f
Size
35KB
MD5
befbc25f088f88bbbb0508d20bad85bb
SHA1
ee70f531f397d00709b5179fa1cdaee9d0897ffb
SHA256
bea33b99c50ac6aebb8682c8e435b7367e4aa805b900844b5138ffdd3108746f
SHA512
737e4ae286641aeaea395d8ee85fd371319bfb02a5032f1e0b7735b3ec3809c5b9bf43d14a5f236d0bc1d36d3e0f6d25a29163d1e4ffdf9c1314abc300df6d9d
SSDEEP
768:eQoi6qZO1Qegd21ykPIPJw6fN4dVGJJ3+zVQ:eQv6qZ4Q3YsxwFM+zVQ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ