DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
fa638a338c16de7913bb3f9dcac460427468527921eb59d6510af6f2c6d4c971.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa638a338c16de7913bb3f9dcac460427468527921eb59d6510af6f2c6d4c971.dll
Resource
win10v2004-20220812-en
Target
fa638a338c16de7913bb3f9dcac460427468527921eb59d6510af6f2c6d4c971
Size
20KB
MD5
08ff696c76f1e5d8c8095ad57dd06af4
SHA1
510a838d4a57aa4b194180999ffc27e022373578
SHA256
fa638a338c16de7913bb3f9dcac460427468527921eb59d6510af6f2c6d4c971
SHA512
13a2e118449a1728d34c8a224df4d41a69c6d7fbad899c2e89f13ea4aaebc491f10f5a3050a1b013439c3695c568a7ccc2e5b748e110416b279f7d4739837fa7
SSDEEP
384:BWWTEcWd1mouqQnCspEhP9x/ntH1JNCJ61CoRkcEZqk3j9yN6JE+T5M56m:WDcpqhs+ZftDNOFIk3jLJEU5MF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE