DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
e0b0e67ecc2a43a8cb841ee9c62ae51cb0f1a7e386f762bf670e3a01317d391b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0b0e67ecc2a43a8cb841ee9c62ae51cb0f1a7e386f762bf670e3a01317d391b.dll
Resource
win10v2004-20220812-en
Target
e0b0e67ecc2a43a8cb841ee9c62ae51cb0f1a7e386f762bf670e3a01317d391b
Size
30KB
MD5
5b05060c0f30ddc2fe4ce34ac543c96e
SHA1
aeb480513c06fa0f323ffb614661881621d43a74
SHA256
e0b0e67ecc2a43a8cb841ee9c62ae51cb0f1a7e386f762bf670e3a01317d391b
SHA512
9980d7962d795c3118efacb332e1460ea23e5786c63c08d7ac5fab28d6649d8bf6c0e5f98a944bcdaf43c3e9a6fe57320a956e43d8e2516066120cdc34e22e1e
SSDEEP
768:xKSqqu4u0GQPnOGbsOL7YhJPaJGf1H3tGrrbdPY:zqqu4u0GQ/TvAJPa+0bJY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ