DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
cd758b765a270ec80035d3d90f412abcd946430c6a8faa43a2490b8e38bb659e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd758b765a270ec80035d3d90f412abcd946430c6a8faa43a2490b8e38bb659e.dll
Resource
win10v2004-20220812-en
Target
cd758b765a270ec80035d3d90f412abcd946430c6a8faa43a2490b8e38bb659e
Size
120KB
MD5
6d0de057d4ffbe3573ad918a34423a23
SHA1
f5e4c1600d4a5865c165e0eb7640db64700b9de9
SHA256
cd758b765a270ec80035d3d90f412abcd946430c6a8faa43a2490b8e38bb659e
SHA512
555734c839cd8ed97b20c257f83320295178316981fe35d77c1f36337db11f9f0483c87e1afd2206d394912756c3a4b25fc49b64b45d70c3dcb3c7edf3c543a1
SSDEEP
1536:vpq2QQzTa6+J9uafOmXOVv36v3qLqMtPt:nnzTkQKhXGf6v3qmMdt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE