DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
6256f0defbc2d3987de940af8729d1a032cc2f78f89a9866a66843d6ed4fd574.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6256f0defbc2d3987de940af8729d1a032cc2f78f89a9866a66843d6ed4fd574.dll
Resource
win10v2004-20220901-en
Target
6256f0defbc2d3987de940af8729d1a032cc2f78f89a9866a66843d6ed4fd574
Size
236KB
MD5
2c20a50948e61b783725a504adb246b0
SHA1
c5c928b7793a6b3258b98e01131a1e27287ab4a3
SHA256
6256f0defbc2d3987de940af8729d1a032cc2f78f89a9866a66843d6ed4fd574
SHA512
06b2dfb1c8fc6026e75f5c09b3af337a358363bded40fedd780f5e17f122508ffaaad884841a186f7b4fa48cc6a1145e0d1c8565cdcb438ec3f272b6201081d2
SSDEEP
1536:fSq6QX/h+nKRFKiHCj/yYQMf05ajGTXM72cUr3333aYeO06RG3yERH+w:Yw/g8W0vX0XYnbcDQw
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ