DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
4c3f3f70e643d2547056692581da7efccf568e147aee0e368491177d1b91d552.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c3f3f70e643d2547056692581da7efccf568e147aee0e368491177d1b91d552.dll
Resource
win10v2004-20220812-en
Target
4c3f3f70e643d2547056692581da7efccf568e147aee0e368491177d1b91d552
Size
85KB
MD5
9153596e4f093b66bad1f3ddff04f730
SHA1
52bdfeeffdbcf0489cf3fa4c5add4c70a7ee7c41
SHA256
4c3f3f70e643d2547056692581da7efccf568e147aee0e368491177d1b91d552
SHA512
0af2e7c19a9797f1a9c6ab5aa63433d69dd1a4d32913a08b52310d9fc1eb8a1e94dc2a8dca110f1dc6e80ebc95fa2130a78c315f852b2e9f69faacf006a0472f
SSDEEP
1536:2sh17gg8XqctRo4fQVFA27LfWPutVfj+WMUYF5C07HipfDArk4kJTPDc1QrL5:/AXo4fQHA27vDAD5CTprak9d1
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE