DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
cf707b69e41202b72f59f8d24eede436fb435937015bdb4ade03dd449e7a5b4a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cf707b69e41202b72f59f8d24eede436fb435937015bdb4ade03dd449e7a5b4a.dll
Resource
win10v2004-20220901-en
Target
cf707b69e41202b72f59f8d24eede436fb435937015bdb4ade03dd449e7a5b4a
Size
120KB
MD5
16cddd7695c575f06a692d49565f506e
SHA1
a438047e24766ac5c06d3859bc4e681e9c5449e6
SHA256
cf707b69e41202b72f59f8d24eede436fb435937015bdb4ade03dd449e7a5b4a
SHA512
b08666ac7cf528ac497ec7deb3df287a15939bd02f8288ecbedc197598421a0da6c9cdf80fb2e877d0f38ccc3475b0da436312203c88a21ec4b4369d9d64b5e1
SSDEEP
1536:DJqCQ4dbouOW9uR1WN+I8iov3daD5gJuZ:r/dbFgvG+Cov3dMgK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE