DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
eede429892d6d978a5b71bc1f03e64942082e6b0702b64e8b39eda306a18e139.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eede429892d6d978a5b71bc1f03e64942082e6b0702b64e8b39eda306a18e139.dll
Resource
win10v2004-20220901-en
Target
eede429892d6d978a5b71bc1f03e64942082e6b0702b64e8b39eda306a18e139
Size
124KB
MD5
73c94aa90c38a17c3fc0537964551180
SHA1
1ce237e9e44b06b32eed2ef0e4f16a008c7a0de7
SHA256
eede429892d6d978a5b71bc1f03e64942082e6b0702b64e8b39eda306a18e139
SHA512
f3920e031f5718cadb73d004c4724c597ffc7dd7e42523ad71bb7f887a4dbcfa116e489e33e83c7a1fa708241ed0f50206922c1cefc0084306fad02e05ae3cf4
SSDEEP
1536:wBqWQXVQJulFuogcgmh2Rl2+pdiY9c41SFa:YeCGuogVrl2+bz9SFa
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE