DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
deaeb49b6556f4e3cb1e8813ec3fc44d697e644b507ca6fdd99819e90cc0d20c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
deaeb49b6556f4e3cb1e8813ec3fc44d697e644b507ca6fdd99819e90cc0d20c.dll
Resource
win10v2004-20221111-en
Target
deaeb49b6556f4e3cb1e8813ec3fc44d697e644b507ca6fdd99819e90cc0d20c
Size
128KB
MD5
77e67ad42bd63ab87400b61885358320
SHA1
e4be7e49cd24f1a3b0b9c1496d04cf8fd636a173
SHA256
deaeb49b6556f4e3cb1e8813ec3fc44d697e644b507ca6fdd99819e90cc0d20c
SHA512
f76c0210e8b287aaa7bc44431d023679ed62dc16d43fadc60de0f488102fefc638f0a6e6019a496c3bcfdd7905b3576b21377e8e751b88db73b48e75a6609d8e
SSDEEP
1536:0JqYQw0QByS5A8i2li95fpFg7ezKMTlCkPm3b:WBbYS5A/2ik4lC5L
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE