DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
a3482224d9cca047ef6b790130569352411a8906fa4e71c07d595fa46fca8ff6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3482224d9cca047ef6b790130569352411a8906fa4e71c07d595fa46fca8ff6.dll
Resource
win10v2004-20221111-en
Target
a3482224d9cca047ef6b790130569352411a8906fa4e71c07d595fa46fca8ff6
Size
116KB
MD5
0e4eb707389267f27b61292b3c0cdea0
SHA1
154e62f7d251773ada83f44b3a3f6467b31ef4f5
SHA256
a3482224d9cca047ef6b790130569352411a8906fa4e71c07d595fa46fca8ff6
SHA512
c6776767528a6e1a28c27b392e5777fe90f466b9d93c06dc1a366ea8d5b064e290ff0831ed566ea49a2d19c70cfdd2e9a3f2f9a786b56222ae8eca944b890229
SSDEEP
1536:tCiJAvdqZOQvIBzazLs/DQLCufK8KXwR4NRo:tCEAgOVz4VCufK8AwRURo
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE