DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
eae35ebe7366cebe54160d4329d7b446f7a8b22037df1b1bc7438ad3cf1aeaa4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eae35ebe7366cebe54160d4329d7b446f7a8b22037df1b1bc7438ad3cf1aeaa4.dll
Resource
win10v2004-20220812-en
Target
eae35ebe7366cebe54160d4329d7b446f7a8b22037df1b1bc7438ad3cf1aeaa4
Size
116KB
MD5
0a8b94b494ddaec007dbb092379e3ee1
SHA1
317bf0335a4002e044169e7dba5db225e97cd18a
SHA256
eae35ebe7366cebe54160d4329d7b446f7a8b22037df1b1bc7438ad3cf1aeaa4
SHA512
c397e1dbe5e77cd45a74f22560070f875932fa1f2c5a3aee688544ef25897ed11f885e83f98dbad17f2772711efc1d22b298d7688e21c0b27722b34521877e44
SSDEEP
1536:+BAvBqZ+Qid1iiQ2zDVmPCjsiUUtuKWNuB6Av:yAU+tKCjsiMKid2
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE