DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
4dd8259f685e8e9898d14f9f575f4b5230800080a81a8c8356d325b0fc1374d9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4dd8259f685e8e9898d14f9f575f4b5230800080a81a8c8356d325b0fc1374d9.dll
Resource
win10v2004-20220812-en
Target
4dd8259f685e8e9898d14f9f575f4b5230800080a81a8c8356d325b0fc1374d9
Size
124KB
MD5
7cf76279ac44ae36ed8ba6416967a3d0
SHA1
3d132a2ef72a12c9dd8ba28473f3e79a882b8092
SHA256
4dd8259f685e8e9898d14f9f575f4b5230800080a81a8c8356d325b0fc1374d9
SHA512
95a7d4520ede165a34d4691034a1d43418812b603048b89b5b64d282e7bf513dd30870284bbbe280e8417f51816b4fdba8d055611be773a8f71b31fd10137160
SSDEEP
768:QCOqlQuGf0eYX0ux/bjNub/viZZ9L7uZQ5a0c8fQfLLSXkYUcvUkRe6U/nKn2ma0:XOqlQKBX0uxPA03/5Hc8fA20MzLU/+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE