DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
254786bc930cd6b690d5431f58820dcdd6ce84254242b8ee9f436257bfb64244.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
254786bc930cd6b690d5431f58820dcdd6ce84254242b8ee9f436257bfb64244.dll
Resource
win10v2004-20220812-en
Target
254786bc930cd6b690d5431f58820dcdd6ce84254242b8ee9f436257bfb64244
Size
59KB
MD5
6735b0d9a1d664f1779eabb63ee38780
SHA1
bbbf2536d0dfab84186f88c7216f570c7a233c4d
SHA256
254786bc930cd6b690d5431f58820dcdd6ce84254242b8ee9f436257bfb64244
SHA512
d364c12d9c4c3c865d02f439f9920a3165abe8d6fcb25d9f7437f85d1d14480b0a74bcc51511d4cd2b25c35d4e2599a09bf1a9008826c0e6b76e98555d4863d7
SSDEEP
1536:OIy7m2a7mmapoN7OR1OwoUP/9wDvgEslqr6p:OItpapoNiF/9WvgE2qm
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE