DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOn9
Static task
static1
Behavioral task
behavioral1
Sample
a90e9a0d5d29f1be42860a5b1418fd468dd33a2cf90c4b0d57d354de542deb55.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a90e9a0d5d29f1be42860a5b1418fd468dd33a2cf90c4b0d57d354de542deb55.dll
Resource
win10v2004-20221111-en
Target
a90e9a0d5d29f1be42860a5b1418fd468dd33a2cf90c4b0d57d354de542deb55
Size
134KB
MD5
043f94fe0c678df4923343c56266fc29
SHA1
5b9f1d891bfd74e021fe607b91693e2ae504027a
SHA256
a90e9a0d5d29f1be42860a5b1418fd468dd33a2cf90c4b0d57d354de542deb55
SHA512
540b64506f121f8b02657ee81946cb7b766d02f5eab583b1f740551d15a970bcf50f0174d0587a7b95bae140e33dd084bc90b034d1fc6a5546085e1c29d67e3b
SSDEEP
3072:BvUrdGT8z1550XOeMb1aoBw7V/X9K+GIW1w6q4y4aIp:ZUXDradDQw6w
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOn9
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ