DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
cd0012fec5b3a78faa6ab603509e87303fe586efa7e51a5fa4897812f58ac796.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd0012fec5b3a78faa6ab603509e87303fe586efa7e51a5fa4897812f58ac796.dll
Resource
win10v2004-20221111-en
Target
cd0012fec5b3a78faa6ab603509e87303fe586efa7e51a5fa4897812f58ac796
Size
120KB
MD5
9d15192a99889bd211c174980a304390
SHA1
d9c27edbcb958897f60b1f3b7c5b593e25b8b515
SHA256
cd0012fec5b3a78faa6ab603509e87303fe586efa7e51a5fa4897812f58ac796
SHA512
19145f4c24ca8514a38cdd5b213006ce6097c94a2d40ba95dad826cc7b25f92b8774c0d9e0463fd1b0e2101ab0d2fb243a46f36655a28bb193a8c1f5171dd652
SSDEEP
1536:OlqcQf8EVmtoAap73Q+jZsisiuxnf2j1Dezyc:kw8Eyrap8YsifuxfY1iGc
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE