DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ec10d64f0440906e47a4212cdcfdfe48f8cedc04a020c553339b58c559e5533e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ec10d64f0440906e47a4212cdcfdfe48f8cedc04a020c553339b58c559e5533e.dll
Resource
win10v2004-20221111-en
Target
ec10d64f0440906e47a4212cdcfdfe48f8cedc04a020c553339b58c559e5533e
Size
121KB
MD5
907368ce6e56834adaea848b1eb3473f
SHA1
b4645423edd9d4c64a697ab37d1620323d287a32
SHA256
ec10d64f0440906e47a4212cdcfdfe48f8cedc04a020c553339b58c559e5533e
SHA512
685a1ae375d0317a9775cac45a437e9e09db3feaa25f02fecfb4edc9ce43a544f5e89dc7215c27d43f23846a125f2d67aa062cc8c9fb8131338fc039fbd30b25
SSDEEP
3072:g0SbkroqhUOMQG97IkcwnPFW31376mCxixIsd5yr:hLUso872yR3CxDsd
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ