DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
bd93837807d81a2434269fe6f145f91281366e559484f07dc548774c1cab8436.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd93837807d81a2434269fe6f145f91281366e559484f07dc548774c1cab8436.dll
Resource
win10v2004-20220901-en
Target
bd93837807d81a2434269fe6f145f91281366e559484f07dc548774c1cab8436
Size
91KB
MD5
c1d8276cb483d19b9ec1dd01887db21f
SHA1
bd4cc1defdc0788cfcb8256a93658fa5e155f8a7
SHA256
bd93837807d81a2434269fe6f145f91281366e559484f07dc548774c1cab8436
SHA512
2beb9229bfa03f6f42a9780d99c8dc65d044c59cc63ef42d4c9de813debd37d7e27448d2ab29c4c829414d14d26992bee42365ebff00c0ec65ef476126909bd3
SSDEEP
1536:vGl9JtL3YwBx0UimNQv8uh+YyBx1+wX2m785UQojfhJh1bHskytDWtzAujdlQvS:vGzJ53YPmNu+Y6G5y7fbp0yRjdlp
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE