DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
a34a2feb1ec2700a979c6581c1c2d7fe69f2d84866a07ade3e3d1fe4fd7597e9.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a34a2feb1ec2700a979c6581c1c2d7fe69f2d84866a07ade3e3d1fe4fd7597e9.dll
Resource
win10v2004-20220812-en
Target
a34a2feb1ec2700a979c6581c1c2d7fe69f2d84866a07ade3e3d1fe4fd7597e9
Size
19KB
MD5
8303f8bef6e41d6a6b72a706353848c3
SHA1
2095a58bbefb34cb9b9717b202c9c94eae30919e
SHA256
a34a2feb1ec2700a979c6581c1c2d7fe69f2d84866a07ade3e3d1fe4fd7597e9
SHA512
f46cce411360e7335f62a278b66ca31cab8b73a85aa8ecc0f58bfb13db204bd4ad8e6b57d1bed24d0e543180d8136ecaf3c65bc38ad8b136443d4cfcbb781032
SSDEEP
384:4WWTEcWGPJO3U2ztAwRXVRDjaoxAkQR20qS/Tzp0NJNiFBqCACpSX:zqQD+AfqkQwEANiBqCXp0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE