DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
dcf4d8e9b5f3b1665483e603f974f5740ac3345105ea709cf2e73ec376bd77c7.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dcf4d8e9b5f3b1665483e603f974f5740ac3345105ea709cf2e73ec376bd77c7.dll
Resource
win10v2004-20220901-en
Target
dcf4d8e9b5f3b1665483e603f974f5740ac3345105ea709cf2e73ec376bd77c7
Size
132KB
MD5
71fdc473252067e7495e14c2a9341c90
SHA1
271f83c09ef47242288c5320751c488cd2d0473d
SHA256
dcf4d8e9b5f3b1665483e603f974f5740ac3345105ea709cf2e73ec376bd77c7
SHA512
eac62d7f70aee2ec9962acaf3b40ad8f1397ace91f87fd055bd90490ec7f947b26f0cc53bcbe4cdcdb794c14b4ca3e429f9671cbb1945014fb1442856a3d6cf6
SSDEEP
1536:7AMq1pUQ25MTaopejcTx/qkjIHR29TXNDx:0o52npeoIMIx29TD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE