DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ee04b927cea89727856378c4e2df7aa945114b4231ef909ee581aad257bebe60.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ee04b927cea89727856378c4e2df7aa945114b4231ef909ee581aad257bebe60.dll
Resource
win10v2004-20220812-en
Target
ee04b927cea89727856378c4e2df7aa945114b4231ef909ee581aad257bebe60
Size
59KB
MD5
6bbcbef3419e82f3878b25fe93b5b8a0
SHA1
ee1d2c26286c3143beb9ad4516343a0988296d23
SHA256
ee04b927cea89727856378c4e2df7aa945114b4231ef909ee581aad257bebe60
SHA512
8db7f6637dc5c734588697de4b63a3ec040c5a7163979074b4b4d05aa0c5878897af2a775fefe8c505e5e7660e2ef8fabd690f37036a0297ed2876b831d3ec4e
SSDEEP
1536:mIyHZAw1cJMOJK8ZLLSeH6PV6Gj1hA98bY/QzXP8zrqvsCDe:mIyrP9ILSeH6Va9EXP8zrO/D
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE