DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
35c9b2a38970832e3f2055bf3a781222f340316cda9858a2ec4270975505ff5b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
35c9b2a38970832e3f2055bf3a781222f340316cda9858a2ec4270975505ff5b.dll
Resource
win10v2004-20220901-en
Target
35c9b2a38970832e3f2055bf3a781222f340316cda9858a2ec4270975505ff5b
Size
120KB
MD5
15deaf0c83c1044d84c6ed6c857eb6cd
SHA1
dc21a974554c243e048191da190f2e078ca181e4
SHA256
35c9b2a38970832e3f2055bf3a781222f340316cda9858a2ec4270975505ff5b
SHA512
6adff2948b8ab8f366a056fe548c3cce905c80cd557f8f04624b5736de866e1aad7363bbfaa317ac0b31baad75756c0760cb3478157cb8fd56adb268c8425d7c
SSDEEP
1536:ZhqqQFDf6MmbFmWImx6Ay15WnNQYEM6ss15D:ViDfUoDm4A5nNQ1v
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE