DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
89f0db6794d2404b47e4722323c53aec452936b35e2ce5c78c4bbe3ef09a5564.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
89f0db6794d2404b47e4722323c53aec452936b35e2ce5c78c4bbe3ef09a5564.dll
Resource
win10v2004-20220901-en
Target
89f0db6794d2404b47e4722323c53aec452936b35e2ce5c78c4bbe3ef09a5564
Size
32KB
MD5
a0e4f6b4aabccd4dede29464516fb5f0
SHA1
78983c1c4d56d0f2e986491c23327f11df9e765d
SHA256
89f0db6794d2404b47e4722323c53aec452936b35e2ce5c78c4bbe3ef09a5564
SHA512
c2a7692fefe82e3a565ca1390e5d9ac2349e6a2b49bf75faab7505eaa4fb98068b88915bbd589377320f875e300f322a52944a111ae60bc8ccc6d066f7556a37
SSDEEP
768:AoisqZOLQ0S4w+uhDncTUG8Bh1iZBknZCpup+zx1Q:AvsqZCQZ+3UG8BTiZBknZhpgW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ