DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
220a3eed03b9a1d712b67c2dee150865acf1e3986c9b560b26a0deca400575e2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
220a3eed03b9a1d712b67c2dee150865acf1e3986c9b560b26a0deca400575e2.dll
Resource
win10v2004-20220812-en
Target
220a3eed03b9a1d712b67c2dee150865acf1e3986c9b560b26a0deca400575e2
Size
120KB
MD5
06ec79ee7e9b8337a8bd8f148a717370
SHA1
3e81110555f71adb1b7c2c9cffab5c1aee7e953e
SHA256
220a3eed03b9a1d712b67c2dee150865acf1e3986c9b560b26a0deca400575e2
SHA512
83869b54095212d4d2afda36eafb4678d3a225e2946b47d30143bab4092b30be5477195f27ea1f3d227b91ca8d2ee0491694c167c53669abbcc70ecb76921499
SSDEEP
1536:tNqMQlu4XMKTwjaDKj+VeK6TV6P19UCRg1gOVAu:bmu4jTwj1JKMGgCRgau
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE