DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
059e436742de797637dc820fc5b02ec12b0703603017d4211c8c896e74c0abfd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
059e436742de797637dc820fc5b02ec12b0703603017d4211c8c896e74c0abfd.dll
Resource
win10v2004-20221111-en
Target
059e436742de797637dc820fc5b02ec12b0703603017d4211c8c896e74c0abfd
Size
120KB
MD5
77a5b173b05b44194577466ef4dae300
SHA1
c051f8a796551b05aaba28a6f99079ec9149afb7
SHA256
059e436742de797637dc820fc5b02ec12b0703603017d4211c8c896e74c0abfd
SHA512
da2f7a9c4fadbf8213b5043b4ac3c1ff186ea1a270288aead2570bca520190ee0aa1501f2cc397bc7c73bf44664f33a3134d8b8eb785a2ea8be340d2dd28eb84
SSDEEP
1536:NJqCQ4dbouOW9uR1WN+I8Pov3daD5gJu8:l/dbFgvG+vov3dMgH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE