DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ec6fa1f1a58af68af4a2459070c09eb5cd338d66ece70fabb1a7b5bfb07bef71.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ec6fa1f1a58af68af4a2459070c09eb5cd338d66ece70fabb1a7b5bfb07bef71.dll
Resource
win10v2004-20220812-en
Target
ec6fa1f1a58af68af4a2459070c09eb5cd338d66ece70fabb1a7b5bfb07bef71
Size
7KB
MD5
e0d8419158ace15b2bcf13271e95ac54
SHA1
e6f0b876513567f12886da9aa06b9b7c8a12ce7e
SHA256
ec6fa1f1a58af68af4a2459070c09eb5cd338d66ece70fabb1a7b5bfb07bef71
SHA512
27213ff72c2b76eacdc9859b48d258fcc84328353456adc4ea0f51a9a6eb3b5979b8c732f29913e66ae325d5efe7a3503dae30f3a6aec2a24d088506c352fe70
SSDEEP
96:TTtuqLlZKK4cmk6WM6m+tChb1gp5YOoA5/RedPLbuFLpkhjrIidWL:1lY46z65GgHcPHuGGisL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
??3@YAXPAX@Z
_CxxThrowException
_EH_prolog
__CxxFrameHandler
malloc
free
realloc
memset
memcpy
_stricmp
GetModuleFileNameA
CreateFileA
GetFileSize
ReadFile
CloseHandle
FreeLibrary
HeapFree
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualFree
VirtualProtect
GetSystemDirectoryA
GetComputerNameA
HeapAlloc
GetProcessHeap
VirtualAlloc
GetWindowsDirectoryA
GetUserNameA
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ