DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
4bb005439023b65532fe60d2d5ab5d67a7cd7edb19914ec9dce10851cb0184cd.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4bb005439023b65532fe60d2d5ab5d67a7cd7edb19914ec9dce10851cb0184cd.dll
Resource
win10v2004-20221111-en
Target
4bb005439023b65532fe60d2d5ab5d67a7cd7edb19914ec9dce10851cb0184cd
Size
120KB
MD5
e14eadec410cf1a1138780e848c171d0
SHA1
0164fab3e6690e6d4fb7e9da9d267b7abb40cb52
SHA256
4bb005439023b65532fe60d2d5ab5d67a7cd7edb19914ec9dce10851cb0184cd
SHA512
ca96e770458d56b9aac9e7045b1b539489a5edf3d4032bb1984c72069115bcd38f8e91ba78c58fa5bc7bf1077c263b139aba785587853d461e06f52cf5a56147
SSDEEP
1536:K+qCQmOszcIoWkwKnlAlv4Jpo0WZdozv/rEpncOOY:l3OeoyH2gnsgcOt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE