DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
bd04828f423d88ec76de9dc38d40888eaf4053872a6809169de79eab6790f931.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd04828f423d88ec76de9dc38d40888eaf4053872a6809169de79eab6790f931.dll
Resource
win10v2004-20220901-en
Target
bd04828f423d88ec76de9dc38d40888eaf4053872a6809169de79eab6790f931
Size
120KB
MD5
41b28dd9fc9cb1ad880dd9c02a840a63
SHA1
ed8fc8dcad546dc3d59e3078ad7d5bcb155d9c9d
SHA256
bd04828f423d88ec76de9dc38d40888eaf4053872a6809169de79eab6790f931
SHA512
80a90064dd8eec0d733d7b57f9fd689eedd9bea1230db6218d144e8877c9a09441950a88668481047e8d943371e2dc0dcb3b2b03edfc8f82a40176d910d31ff9
SSDEEP
1536:7ZqAQ51LXJ2xPyv80tztOy5AKf5zaYuje4ygvsz5b:pY1L0SadGu1NS
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE