DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
4b470e238f45ce4b84a385c66e113535f76f2de259d292df5e144820df9f27ef.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b470e238f45ce4b84a385c66e113535f76f2de259d292df5e144820df9f27ef.dll
Resource
win10v2004-20220812-en
Target
4b470e238f45ce4b84a385c66e113535f76f2de259d292df5e144820df9f27ef
Size
120KB
MD5
762a09d670ad3115d9b695dcf46da8f0
SHA1
544f6020fc4e0eb2b1e94ffd7939ed21058f215c
SHA256
4b470e238f45ce4b84a385c66e113535f76f2de259d292df5e144820df9f27ef
SHA512
2e8ebb6327a53e544dde47ae93d18be46e0b17dbe0080eb7b3db4ebcdf70b8da8d1c5c55ceaa275653ea829995ae2dbaf82deb8aee8aed8c07a67ae0b3ec9429
SSDEEP
1536:+Vq0QBiiT9uCS2TWCZ1R7Nu+RMV+0jcfNIFDIMChT:U2iisCSd7+RMV+0jcfNmCt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE