DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
9bc8eb52a9e2d8a5f64cc3a98d45119742c2a93efd81952abea42ad8bca5f46d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9bc8eb52a9e2d8a5f64cc3a98d45119742c2a93efd81952abea42ad8bca5f46d.dll
Resource
win10v2004-20220901-en
Target
9bc8eb52a9e2d8a5f64cc3a98d45119742c2a93efd81952abea42ad8bca5f46d
Size
28KB
MD5
815a0f3666130571b8eb56201f2ae05b
SHA1
47ff74959ab56a61cc18eef50231f6fa6e1d8d24
SHA256
9bc8eb52a9e2d8a5f64cc3a98d45119742c2a93efd81952abea42ad8bca5f46d
SHA512
79dd23286e111c564aaab328208ec164bc5396b434208d6d1eb90f398686175515cb997db052f4f47fc4a13f5397c9804ca8705628c2f86dc5632d52fdf55545
SSDEEP
768:bKSRCquPr0GQAQRCp6E5X/TWBhDo7J7Khfdzwh7u9:JoquPr0GQ84EbWOJ+h1ku
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ