DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
b85bcbd161865dfb3789743f30b2b40d5c854d7c4311863878103520c8599192.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b85bcbd161865dfb3789743f30b2b40d5c854d7c4311863878103520c8599192.dll
Resource
win10v2004-20220812-en
Target
b85bcbd161865dfb3789743f30b2b40d5c854d7c4311863878103520c8599192
Size
128KB
MD5
43d216ccd36e3f5c496499ea96da40d2
SHA1
3ea196a55fae7110f709608eb24800af016652cc
SHA256
b85bcbd161865dfb3789743f30b2b40d5c854d7c4311863878103520c8599192
SHA512
21928661f9fbd45b3f059cf3448a11b8b434c284c84410aa79550a75e45ac29fd3433d381732a62104287fff2f4029f28535608b09c4d61060a8c648c97c6555
SSDEEP
1536:pJqKQjdDBUhxX+crmbuY4KA5UNgYzBxgYN:xCx0YcrmbuY4F5egCxgYN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE