DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
beefa7522b324863dbd536584e666cec1ffeb40380b707bb785735749427a055.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
beefa7522b324863dbd536584e666cec1ffeb40380b707bb785735749427a055.dll
Resource
win10v2004-20221111-en
Target
beefa7522b324863dbd536584e666cec1ffeb40380b707bb785735749427a055
Size
120KB
MD5
736a75515575d035448aa47e48c05950
SHA1
b900a020982bef3cee3778d591f4b2fd93b8bf48
SHA256
beefa7522b324863dbd536584e666cec1ffeb40380b707bb785735749427a055
SHA512
17139d5ca23d072beba70178de827e10b6e30ed2040acfb34bb64ad1796ea5410a5f27124e7a52494ddc9fc8ca25849671fbf500abc9d38fd0f628fd49fa8115
SSDEEP
1536:tNqMQlu4XMKTwjaDKj+VeK6TV6P19UCRg1gOVAO:bmu4jTwj1JKMGgCRgaO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE