DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a3f148b62e7cd1ae850f30e278390a2425281659a10db34c04d26e358a3c0478.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3f148b62e7cd1ae850f30e278390a2425281659a10db34c04d26e358a3c0478.dll
Resource
win10v2004-20220812-en
Target
a3f148b62e7cd1ae850f30e278390a2425281659a10db34c04d26e358a3c0478
Size
140KB
MD5
06edb1311357a5dede1d7f0d45c46330
SHA1
504fe44d43bd70478aa1b6c2c7d7c4816accfb71
SHA256
a3f148b62e7cd1ae850f30e278390a2425281659a10db34c04d26e358a3c0478
SHA512
52ce76c6c852360b613bf37eb01f71bca90c46ea554635a0a5f44dac1d8074499eb63abb4ebc8f9e0c3f92263f84c7d12d0021e81cf9e4919803d77593f20db3
SSDEEP
3072:GgcmiQOUwkshJY2FR67lDDJZgRM8dUue67gZmrIsFtAvghoXnP7G77tyC:t8UChSrgTe67h7Fqvgho3Pe
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ