DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
45787a48e65b29744542586a8684e354a3332f72b6e43d14cd40200adbd6c89e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45787a48e65b29744542586a8684e354a3332f72b6e43d14cd40200adbd6c89e.dll
Resource
win10v2004-20220812-en
Target
45787a48e65b29744542586a8684e354a3332f72b6e43d14cd40200adbd6c89e
Size
124KB
MD5
20ad277989a1f8b9cdf2fcc20045a628
SHA1
5a2e2a42a0e7244eb6e60a866a00fcba4af85c6a
SHA256
45787a48e65b29744542586a8684e354a3332f72b6e43d14cd40200adbd6c89e
SHA512
20384412ef0e69b2820c12d72b2c693f37ed772635626b495a7a3974bba155d5e722bad347ff3d1b9f1436091c056c2390095b18877b6fef8f372ac261cea734
SSDEEP
1536:n+6qzQC1LPhZYHTbHHA/jbt0Bomxd2WK8Mi2yK:sz1jUfAl0B/IWK8iyK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE