DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
c4b281fa47e40fbcd8366c12d17f25aa3b1f39550340fbcd2b9daf996eaacc5e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4b281fa47e40fbcd8366c12d17f25aa3b1f39550340fbcd2b9daf996eaacc5e.dll
Resource
win10v2004-20220812-en
Target
c4b281fa47e40fbcd8366c12d17f25aa3b1f39550340fbcd2b9daf996eaacc5e
Size
120KB
MD5
02dc2db3b7786e5ee77566f5bb186f60
SHA1
10c59ee86645db5ea1450cbb6f3a5072105e29c5
SHA256
c4b281fa47e40fbcd8366c12d17f25aa3b1f39550340fbcd2b9daf996eaacc5e
SHA512
524b3113e4cfdf93b0ca2c6e803d27d2ca68fa38ff7ce2f0d461842029bffa3d1827bde9e7841eea862c8cbd3ecaff0a44d3a5a59ce927f064de9dbd92b920ff
SSDEEP
1536:OlqcQf8EVmtoAap73Q+jZsisiuxnf2j1Dezyw:kw8Eyrap8YsifuxfY1iGw
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE