DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
b8860113c4f22644ba3b33cd653382e6052cb8d9f5d717d9efcf2c2c288da69e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8860113c4f22644ba3b33cd653382e6052cb8d9f5d717d9efcf2c2c288da69e.dll
Resource
win10v2004-20220812-en
Target
b8860113c4f22644ba3b33cd653382e6052cb8d9f5d717d9efcf2c2c288da69e
Size
21KB
MD5
8ae5f18b9555d66213aa1ddf1150c440
SHA1
23ff7e1a560a60db4c53f1b3f00aa6523d77447f
SHA256
b8860113c4f22644ba3b33cd653382e6052cb8d9f5d717d9efcf2c2c288da69e
SHA512
0e11e50d1f610e73ef28c02ab565b88cc06d0efa1d82dbbb210085d79028e521b94f02554a09cd795388072efdc898f357a2bcd97e0c664c8e87d250ee587dbb
SSDEEP
384:7WWTEcWp48f+HPFtCnqCVzgDjVVlJhnokSABHxeXl9dqA5/znlltgeJ:0r48GHtttCV2hJtokSABReXXrRJv
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE