DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOn9
Static task
static1
Behavioral task
behavioral1
Sample
89f54bf5c1566afe64c3839cc145b59ac5567cb612664152fad262dd8860afe5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89f54bf5c1566afe64c3839cc145b59ac5567cb612664152fad262dd8860afe5.dll
Resource
win10v2004-20221111-en
Target
89f54bf5c1566afe64c3839cc145b59ac5567cb612664152fad262dd8860afe5
Size
127KB
MD5
c3ce97f3625f98611a5807cb680d543e
SHA1
1cc33c20861c5047bbe01f41e62c93848ef45415
SHA256
89f54bf5c1566afe64c3839cc145b59ac5567cb612664152fad262dd8860afe5
SHA512
a8a8803976b9ee0da0729b930242cf7e7ca28ae374c184a1b0df326885eeeef81cf76825763a05b1228634187f388a6e8d015e2ba4332d35b9b6c87aa8664357
SSDEEP
3072:o79JQ7nJBCUqZX/Uv0VSsakHmzu/8yLlIiQuxal03GcIMM:OakHT1rFZRA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOn9
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ