DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
ac5278ddda09f5304dfe0865e6bc402f12564656f786b278d61c2901c17f03b2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ac5278ddda09f5304dfe0865e6bc402f12564656f786b278d61c2901c17f03b2.dll
Resource
win10v2004-20220812-en
Target
ac5278ddda09f5304dfe0865e6bc402f12564656f786b278d61c2901c17f03b2
Size
128KB
MD5
f945334c1fee797a100ddd8a28583020
SHA1
e4e1b56239b8f672d5e352ef0e9e950f040c72ce
SHA256
ac5278ddda09f5304dfe0865e6bc402f12564656f786b278d61c2901c17f03b2
SHA512
51fe2a9893d1b52f680f6d9fa271b7139b2a8f971e2ce2b84e9b8402641d41f3c4e74fac1b06d71ce824710ea1b77b2c2c49ad74430e0f2b0a4b06a56fc90400
SSDEEP
1536:32qxQIGXA/u1W3ZMqx2J45thqAAVSVhgeJa2DIY:X9eMMqxv5bqAAVSVhetY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE