DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
ef59a6b5c7a323560a7f9095802006667117029b91bfe30326383412bd02a420.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef59a6b5c7a323560a7f9095802006667117029b91bfe30326383412bd02a420.dll
Resource
win10v2004-20220812-en
Target
ef59a6b5c7a323560a7f9095802006667117029b91bfe30326383412bd02a420
Size
120KB
MD5
e4c48c5c31782b37bce005be2a303ddd
SHA1
29e3f2abae1437f8e22718d1567eb416465bba08
SHA256
ef59a6b5c7a323560a7f9095802006667117029b91bfe30326383412bd02a420
SHA512
47a3957d847ed1f7eef31a2699536fd02b89733ec64436d89ea06b54d2b7c4f323aadcb338dbe5eb041e566c46cb9b6b0d8bc63728af8fdd967e61a6edb60b40
SSDEEP
1536:NJqCQ4dbouOW9uR1WN+I8Pov3daD5gJu/:l/dbFgvG+vov3dMgo
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE