DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
d12f1ebd3d8308b0187ff03374b2b555ef4d47ca1f693e86a6f53d88da4bcd06.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d12f1ebd3d8308b0187ff03374b2b555ef4d47ca1f693e86a6f53d88da4bcd06.dll
Resource
win10v2004-20220812-en
Target
d12f1ebd3d8308b0187ff03374b2b555ef4d47ca1f693e86a6f53d88da4bcd06
Size
20KB
MD5
0f088c1f908cb93faad44ba091e38c7d
SHA1
9f5d724c136854170fd8a4e7f89118db68440984
SHA256
d12f1ebd3d8308b0187ff03374b2b555ef4d47ca1f693e86a6f53d88da4bcd06
SHA512
f62844c06999c7d845d0d977740736965f0bfe85182e4ee20cfced1387a40ac52390a7cbfdd9ea9388b951a3353c84de4246eb18f4bd69128cc3822939705702
SSDEEP
384:a6WWTEcWRfgu9ybTTKUc1Tn9zvLhyBiUqfHg8D+dIcjzOhLgEDFL/QYYYx:oz3ybSD99zMirvg1vzOpbF1
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE