DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
4230c4c332133f0cabfc4b67ed0a124bb404383450aef25e5ba5392ebb04d2ce.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4230c4c332133f0cabfc4b67ed0a124bb404383450aef25e5ba5392ebb04d2ce.dll
Resource
win10v2004-20220812-en
Target
4230c4c332133f0cabfc4b67ed0a124bb404383450aef25e5ba5392ebb04d2ce
Size
124KB
MD5
5c06957b20b9a1620d0fb6a3a411b055
SHA1
3f658b8dc9eb02c5b015fd249e4c8785168f6168
SHA256
4230c4c332133f0cabfc4b67ed0a124bb404383450aef25e5ba5392ebb04d2ce
SHA512
f95464d29ab94446d43f90e204fc8e6580f544025559551c558e7e69f9308a8c232f510e12e96a5222957e285ab97fe1c62c928c525178f3ecfa271a728fd0f2
SSDEEP
1536:PwKqbQXb0o9tPqG+FwMReMgAony0fwf14:eOQ0ycogAo/fwf14
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE