DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ef4c0b9fecf0134deb6b0bdf32c90aa818fe764b0c25ba31f49bbf808eebb549.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ef4c0b9fecf0134deb6b0bdf32c90aa818fe764b0c25ba31f49bbf808eebb549.dll
Resource
win10v2004-20220812-en
Target
ef4c0b9fecf0134deb6b0bdf32c90aa818fe764b0c25ba31f49bbf808eebb549
Size
59KB
MD5
6e4f66c9e35fd7704840bf9bc17a6020
SHA1
d9915e5dd4dd97f3cbddd8e2a097df0e829c1a66
SHA256
ef4c0b9fecf0134deb6b0bdf32c90aa818fe764b0c25ba31f49bbf808eebb549
SHA512
58b579d9722695d6d6fd18dacce9d4aea59bceb257081ef7ff60fc48d06bdf8e3476b2e0bbb95a06d56e52858711c877cc1b841fe3e61ed2c9daabef71108d1e
SSDEEP
1536:HIyuXN/lxiMvY8s7wKSJAzRA795aEmi9AbWainmCYMxhFPFLeuDQ:HI5/lxAvgAq795rN9yMxhzLE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE