DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
44d8632b42076b929724058a788c49ac18061f2fec046c063f28f0e5ad114fb2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
44d8632b42076b929724058a788c49ac18061f2fec046c063f28f0e5ad114fb2.dll
Resource
win10v2004-20220812-en
Target
44d8632b42076b929724058a788c49ac18061f2fec046c063f28f0e5ad114fb2
Size
120KB
MD5
0dbfd8d28eb1d66697b45f41333c43f2
SHA1
0cc97de7434de242d20fd010a2342c0ced643255
SHA256
44d8632b42076b929724058a788c49ac18061f2fec046c063f28f0e5ad114fb2
SHA512
c27e567a278f111316773df05eca478f7d93eeef77caef6b4100486ee8826618edd5bfa3f18c2c683c1969f0dd062dcede8aa9674a60790333b387699dd8a4fa
SSDEEP
1536:Npq2QQzTa6+J9uafOmXOVvA6v3qLqMtPl:tnzTkQKhXGo6v3qmMdl
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE