DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
96472ec145314c4945aa65585f78ad403dfdbda1d0faa7a653000043a0cb72a7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96472ec145314c4945aa65585f78ad403dfdbda1d0faa7a653000043a0cb72a7.dll
Resource
win10v2004-20221111-en
Target
96472ec145314c4945aa65585f78ad403dfdbda1d0faa7a653000043a0cb72a7
Size
128KB
MD5
f8419216a1e7cde67df816a3984db100
SHA1
a69cd916cf953b3f68461d4841d8a59071d6aa66
SHA256
96472ec145314c4945aa65585f78ad403dfdbda1d0faa7a653000043a0cb72a7
SHA512
7a359e568c3c108ba8751786322bc72a0a90892a92106145ff9b19018025917585e010a83c28b09eeb2683927f10d87ffb9488d4e1329025c204be715ea6f1f6
SSDEEP
1536:J55qwQVa8hLiU4lrz7PoDI+xwg0KMKeTA4wOuCj:Jv6a6krXVg0KMKyYOuI
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE