DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ea7a792f360eb67e72781a0a88040e92e0820c36ee406cbdb6de6421b952b0f1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea7a792f360eb67e72781a0a88040e92e0820c36ee406cbdb6de6421b952b0f1.dll
Resource
win10v2004-20220812-en
Target
ea7a792f360eb67e72781a0a88040e92e0820c36ee406cbdb6de6421b952b0f1
Size
25KB
MD5
abee9daf0cb165d9f366dd0a512c3f41
SHA1
fa2cfbc3155036ce68c550de700909f2aa1018c6
SHA256
ea7a792f360eb67e72781a0a88040e92e0820c36ee406cbdb6de6421b952b0f1
SHA512
0cbede9448882f2e9dbda6c7b0e91845dacc9fdf35e9af32977cee4e5a5b8f30da107af2377a75fc2f9586b1abd8048a6a107d5d00f98343c4306d840bf4989b
SSDEEP
384:ojcxz0CKAoqd+13XQapt5svs9fez9ecSQ8wVWLnYBPwrH325VAzdGr9QjJiAZ:s5CKBqdSHQefh9f8eIRWL0DydGr9mN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ