DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
dba42b1dc2312661eeb2f7b49329cbc0cdcab4154d9ac56e3961541ced5f2a55.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dba42b1dc2312661eeb2f7b49329cbc0cdcab4154d9ac56e3961541ced5f2a55.dll
Resource
win10v2004-20220901-en
Target
dba42b1dc2312661eeb2f7b49329cbc0cdcab4154d9ac56e3961541ced5f2a55
Size
120KB
MD5
75173caec70c343d73b3f3853ec9736c
SHA1
a8f499cbaba0617ceebaf08b555995aa84358c67
SHA256
dba42b1dc2312661eeb2f7b49329cbc0cdcab4154d9ac56e3961541ced5f2a55
SHA512
db3fe9aa8cb680ffd60f90c6947c2998645b20fabf622e23e3593c422b188e1b51945e1e68f2ef8e94ee0f608890a851a073a2685bc5a819a21499168e3db6ad
SSDEEP
768:3zmRzyJqmQ2LIHdNBwByWGlA1LQ9pUtbwVkCnyvOQ0X6nrxp8+:3zmRmJqmQ39Kn1rxw3yv70I8+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE