DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
aa5e1ba5402e4242d26b6f95639de55e365ab7723f1beab913a40321686dcbd4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa5e1ba5402e4242d26b6f95639de55e365ab7723f1beab913a40321686dcbd4.dll
Resource
win10v2004-20221111-en
Target
aa5e1ba5402e4242d26b6f95639de55e365ab7723f1beab913a40321686dcbd4
Size
128KB
MD5
b37ad9cfb29fa62491f5ce98e6ed5b32
SHA1
8356e63ac9574f95fb34c8fff2e052959a0280ce
SHA256
aa5e1ba5402e4242d26b6f95639de55e365ab7723f1beab913a40321686dcbd4
SHA512
9161fcdb5be40856683248d8ed0b7e9c92a2ee6bc78a71129232e166f206fd0458916dd30c6d64b267b69a76ca9ba658653d324a6aa7cba41d07f6b21190cc54
SSDEEP
3072:0SL2+lfdHlEAskeGEGAmS2Uh4CUfAYoPD:m+YD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE