DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
838125a1c4141254c771d3f0b2fc9b70605209ba729d6900244f320ef8a8c3ab.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
838125a1c4141254c771d3f0b2fc9b70605209ba729d6900244f320ef8a8c3ab.dll
Resource
win10v2004-20220812-en
Target
838125a1c4141254c771d3f0b2fc9b70605209ba729d6900244f320ef8a8c3ab
Size
36KB
MD5
3d9929d1fce9ff4be75d2b8271d9c079
SHA1
2982b9a4a12de247fba4f5e93eaf7cda6b65861a
SHA256
838125a1c4141254c771d3f0b2fc9b70605209ba729d6900244f320ef8a8c3ab
SHA512
c1728c5987ae57fcdae970947634f5d5aea06ea581de12e4c6e4b63b6b270ab529cc9257b1353b21ffc871f4f481280cc870652fc684f40b9b0b1f5b89b46ac0
SSDEEP
768:4Qoi6qZOMQhXl3U9OvS5xSYksqc4ZUEdQw7yTd1:4Qv6qZpQjPmMYknzuYYd1
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ