DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
d5414e612ea40b4cfe893653e55a84d7e50c6a8d907a44bf9c2f71036e214aa4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5414e612ea40b4cfe893653e55a84d7e50c6a8d907a44bf9c2f71036e214aa4.dll
Resource
win10v2004-20220812-en
Target
d5414e612ea40b4cfe893653e55a84d7e50c6a8d907a44bf9c2f71036e214aa4
Size
128KB
MD5
57eedf8de887e3952450c065d8aacc50
SHA1
45ce9a15d2bae94a744abd8376e2de5fa74b058c
SHA256
d5414e612ea40b4cfe893653e55a84d7e50c6a8d907a44bf9c2f71036e214aa4
SHA512
d8fb9b88c08b51cc9d3a08db70f91952c95a685881347ce4142defe81279b4f53e74fc2a2af513c68562679ce4377c6b5f2ab18dc20935918a633813c3d48c3b
SSDEEP
1536:i1zqVQyWXCF4CHeWW/Wh33KA5s/lKXfuClCZ1YCJR:LXuyDzh33KA5wKXfuQCZeCJR
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE