DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
5f395a424786adce3a11f06025139bd7a72488ac88a798d9630dec4b32abe36e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f395a424786adce3a11f06025139bd7a72488ac88a798d9630dec4b32abe36e.dll
Resource
win10v2004-20220812-en
Target
5f395a424786adce3a11f06025139bd7a72488ac88a798d9630dec4b32abe36e
Size
128KB
MD5
0a97d96824d46ad28a7bf1fa491ea4f0
SHA1
055a6b777759c61c7f666ffd80a004df214c107b
SHA256
5f395a424786adce3a11f06025139bd7a72488ac88a798d9630dec4b32abe36e
SHA512
b72fe2c6d050c5c9adf43af144fdfd690adc1a63b0a1223196c01b5da30935a590a0dd266f2f4a5d1ab78c805a2c185e63f9f285d6de5412635fb9e084cfe99c
SSDEEP
1536:3mqvQVHXWRXjWm5YO6w9E3hy3FVhtoueZIbBr:N03WJjNuw9oo3F/CueZM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE