DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a59c1726c34309565fa277e94604d8ee98c32337bf731a5d70733f199991afa9.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a59c1726c34309565fa277e94604d8ee98c32337bf731a5d70733f199991afa9.dll
Resource
win10v2004-20220812-en
Target
a59c1726c34309565fa277e94604d8ee98c32337bf731a5d70733f199991afa9
Size
139KB
MD5
f1195ee0f18abc6008414705d079025d
SHA1
4869ddcdc10f53891c003f3b5b35344642f13070
SHA256
a59c1726c34309565fa277e94604d8ee98c32337bf731a5d70733f199991afa9
SHA512
fd29027440b291235478cf7c7f3ab421b9e96e852cc7213e1e51448993c468ed3f0e278beba5a2ed02ca31b0fd06a5094b04da10e584dc800f9673b994cfe91f
SSDEEP
3072:ashLKuIUvutuEMPdaTGhrNGKEeRKjRBUNei4Zz/Wohyh8:32RUvuQbhrNXNRvei4ZTW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ