DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
3266b12d898d43389af5af38c2b9879951300f1fdbfca1fd2b3d10630d932046.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3266b12d898d43389af5af38c2b9879951300f1fdbfca1fd2b3d10630d932046.dll
Resource
win10v2004-20220901-en
Target
3266b12d898d43389af5af38c2b9879951300f1fdbfca1fd2b3d10630d932046
Size
54KB
MD5
4037a1ba47d7b46d9a4bb62b47ee9a30
SHA1
9e6d2e78a1342285be46adf6be5aeeced4d7f6b8
SHA256
3266b12d898d43389af5af38c2b9879951300f1fdbfca1fd2b3d10630d932046
SHA512
fac6675a0dde692244f15ad3a9505ceae24388ba5e4544fa43bd204c09d52d7f1d284b61cd3bfb13079477e9fcf8d30ca3761bec622dacca94b7fc1870e74c9c
SSDEEP
768:mykqyQPttw3RpLOFfvNhxVEF2eiHCjMAqxnjGSqzbJUlUtdy8hl995jSHmHBZBA4:RkqyQLG0fvNTk2eiHCj/qFGSorNlJ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ