DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
1e7b74757333b2c1ccefbd0e9394914df22dffccac85520b435a20699c5db804.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e7b74757333b2c1ccefbd0e9394914df22dffccac85520b435a20699c5db804.dll
Resource
win10v2004-20221111-en
Target
1e7b74757333b2c1ccefbd0e9394914df22dffccac85520b435a20699c5db804
Size
120KB
MD5
f9c87635e06533e15f4e7ad8b19bdf30
SHA1
b7206675e46399532174f4af3ee7f5a8c385560b
SHA256
1e7b74757333b2c1ccefbd0e9394914df22dffccac85520b435a20699c5db804
SHA512
4379680df94c888208e40c337a0551e873f7bcdd9cde693c44f7ab441bc57e61e472054ba5fb3e5474a7b21a29d9d65b81c1111e3f1bcddc77fd1d109da0ef46
SSDEEP
1536:+Vq0QBiiT9uCS2TWCZ1R7Nu+RMV+0jcfNIFDIMChz:U2iisCSd7+RMV+0jcfNmCd
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE