DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
e0977a5a42b9734dffa83b45a3a85cf4ffe9774d589847405be48cd280190856.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0977a5a42b9734dffa83b45a3a85cf4ffe9774d589847405be48cd280190856.dll
Resource
win10v2004-20221111-en
Target
e0977a5a42b9734dffa83b45a3a85cf4ffe9774d589847405be48cd280190856
Size
70KB
MD5
73025325ab131acfde3393a0931759ec
SHA1
02821488a30c9a8966731adbecd06e351ad0a863
SHA256
e0977a5a42b9734dffa83b45a3a85cf4ffe9774d589847405be48cd280190856
SHA512
c5f005df433c16043be5a18ac2073fce5882435e3e0930197c983efc7535d8637c2d48811b2fa20c2dfe5513f9da01c4177ff9f37e4610d905ca55bcfcf18165
SSDEEP
1536:eFqXDXQfael+Zo6qkvoE2uCTIH7iHwfK+A1m3OuPvOaFqSx3:7DXReEZoiQ5sHeH/GdnOafx3
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ