DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
e142bbda27050ba7c12d73d78fe16ad9e6abe52558e7ccde8ca734d03c9a8801.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e142bbda27050ba7c12d73d78fe16ad9e6abe52558e7ccde8ca734d03c9a8801.dll
Resource
win10v2004-20221111-en
Target
e142bbda27050ba7c12d73d78fe16ad9e6abe52558e7ccde8ca734d03c9a8801
Size
29KB
MD5
56832f2fc22af546b57b74a69b0369de
SHA1
027f949bb83885a2e93636c3b9a3b01e06783000
SHA256
e142bbda27050ba7c12d73d78fe16ad9e6abe52558e7ccde8ca734d03c9a8801
SHA512
b3f5c338ae54f2d9e03297c47115c5d2cfd7e1413d76ea5433aa1ee46b463ddf1be998127ecc853cfcae7128561bb4992c9028a78365f7ddf448c3a48164b280
SSDEEP
768:wKSRCquPr0GQAQRCp6bAeKZDojtU1XfZE+wHdKwX7+A:QoquPr0GQ84daktefqd9D+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ