DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
40333a0d0d19bbb5b0f8ece8c6bdcb39d85e23056adf7e863f5add1757d169fc.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
40333a0d0d19bbb5b0f8ece8c6bdcb39d85e23056adf7e863f5add1757d169fc.dll
Resource
win10v2004-20220812-en
Target
40333a0d0d19bbb5b0f8ece8c6bdcb39d85e23056adf7e863f5add1757d169fc
Size
128KB
MD5
11f5247d7c59e42a65deefa5c26bfa00
SHA1
12684185d91fe05afbbcc904d8df873ebdd57e78
SHA256
40333a0d0d19bbb5b0f8ece8c6bdcb39d85e23056adf7e863f5add1757d169fc
SHA512
0c5e3a59a63a609acd5cd39dfbce910b7c80e162a18f3839b8e1fd166f1b34f060d1466232a3ccc293141e393f2abe13e98877e3c74aef5f32c871f8dc3eb6e4
SSDEEP
1536:QT6qvQDwXgAnpe1WRmO/7vjXzWA055ok6CICJn//7LlN:iaAZOO/7vjXzX05R6C17LlN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE