DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
9e90939d5ced8f739843b2b8407acd56e4820c3ff33ddbad27dede9cb380f3aa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e90939d5ced8f739843b2b8407acd56e4820c3ff33ddbad27dede9cb380f3aa.dll
Resource
win10v2004-20220812-en
Target
9e90939d5ced8f739843b2b8407acd56e4820c3ff33ddbad27dede9cb380f3aa
Size
62KB
MD5
6badc58d7824e52a8243120609c43c60
SHA1
8581f1a0dcfb1fcd2ea484164d3735dc089fed76
SHA256
9e90939d5ced8f739843b2b8407acd56e4820c3ff33ddbad27dede9cb380f3aa
SHA512
002fec085e22532099dfc773384b96964d2bbf736c14abc74b25dabf824444b7100b2bff96c48320b981d3b21c4922cf640be4ae02bb29cc2681d07b93197a37
SSDEEP
1536:voq0Q/YgNNNQ3wU+iHCj/TMSwhzgHnXJ5:00jSaVMSwhzgHX/
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ