DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
4e836a384287c423276ecbc0ebbce2ee08501c2134eace286a43c0bed1bf0bed.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e836a384287c423276ecbc0ebbce2ee08501c2134eace286a43c0bed1bf0bed.dll
Resource
win10v2004-20220901-en
Target
4e836a384287c423276ecbc0ebbce2ee08501c2134eace286a43c0bed1bf0bed
Size
19KB
MD5
206fe04d0d7ac5f57f4b78170ce71f29
SHA1
9e28a0d165fca28b700682331d0f5ea6b685145b
SHA256
4e836a384287c423276ecbc0ebbce2ee08501c2134eace286a43c0bed1bf0bed
SHA512
5362128bf68e7cf180fa30273007b9587b23eb67920a3efcff32cec57a734d9a651b569607f4657325cd91fab6633e6086ae7e90f068613bff9222940236a7ac
SSDEEP
384:cWWTEcWjd55SolrDwjWU/mCNn49TkRBLoObb66Ij9TfnT:3Zros4WUdy9TOLeTr
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE