DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
ea95a4fb130388169e15c26dfb6749980a8bffce903bb3610403faafa90bc202.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea95a4fb130388169e15c26dfb6749980a8bffce903bb3610403faafa90bc202.dll
Resource
win10v2004-20221111-en
Target
ea95a4fb130388169e15c26dfb6749980a8bffce903bb3610403faafa90bc202
Size
128KB
MD5
512747aa7af54b91f2ef727315de3280
SHA1
4bb128cbe5c7b0f69d24b3f089cba84a450c6811
SHA256
ea95a4fb130388169e15c26dfb6749980a8bffce903bb3610403faafa90bc202
SHA512
5db790df910de3e217bc6bedc2ded05960a6df7cd6419dd5b3b69ebd7c3a975cad98ee5b4269666f95536cdf0018437281974093dd8a8f1070f078f853088328
SSDEEP
1536:NAiqtQIEXi+/kAC+5pnnuBAaqRPMjoKv3Do:WJ0h8kpnnfFhUE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE