DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
90a25bb34d50f7ff3108c11d146f715a3bd6fb43732ec498c3e96baf210e05d0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
90a25bb34d50f7ff3108c11d146f715a3bd6fb43732ec498c3e96baf210e05d0.dll
Resource
win10v2004-20220901-en
Target
90a25bb34d50f7ff3108c11d146f715a3bd6fb43732ec498c3e96baf210e05d0
Size
158KB
MD5
82e3ddcedaf0147f2c334b325badc800
SHA1
20e83c9da6a77117e06ed04522e3b23fa4a09281
SHA256
90a25bb34d50f7ff3108c11d146f715a3bd6fb43732ec498c3e96baf210e05d0
SHA512
782965c5a0a5ddcbbb89101e3e913a0cc3dcb52dca24d2576969c7370a3f489e831db6a0c353d3f2a69086000cd897c00dd71d465351054d3a305e40a2bb842a
SSDEEP
3072:3PGziy0C4CUUszUbt//B8xd95cnhnl8M:3+zin5a//B6IRl7
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE