DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
de505b0a43176a1d243786be5b5b514f56eb694f08c5685973243c4efe0065a4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de505b0a43176a1d243786be5b5b514f56eb694f08c5685973243c4efe0065a4.dll
Resource
win10v2004-20220812-en
Target
de505b0a43176a1d243786be5b5b514f56eb694f08c5685973243c4efe0065a4
Size
20KB
MD5
45cf2d147b7122e587b24094013491c5
SHA1
7569c68a7f84715e3c24f6ee5531050e7f4269b9
SHA256
de505b0a43176a1d243786be5b5b514f56eb694f08c5685973243c4efe0065a4
SHA512
31cc1abed23a8d9348c8f779c83a0e8eadf90ab0238555859a9b42f4fb4ff5d4da7c0792f8316db013d5d56cd29292ef5cd5b4d0c5ca053ef77bb80ff3821a3e
SSDEEP
384:BWWTEcWd1mouqQnCspEhP9x/ntH1JNCJ61CoRkcEZqk3j9yN6JE+T5M56k:WDcpqhs+ZftDNOFIk3jLJEU5MD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE