DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
e4fded351b119361a3be71fd64d153f564765da396dbe8d7408a357e99a8ca0e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4fded351b119361a3be71fd64d153f564765da396dbe8d7408a357e99a8ca0e.dll
Resource
win10v2004-20220812-en
Target
e4fded351b119361a3be71fd64d153f564765da396dbe8d7408a357e99a8ca0e
Size
116KB
MD5
067b1f513fbb1565aad2f5d464839810
SHA1
4369ca5cc4f71d022519df5400319e001ffec952
SHA256
e4fded351b119361a3be71fd64d153f564765da396dbe8d7408a357e99a8ca0e
SHA512
1a467d9a5bd1bdd5ecdc78903e00aa101921bad13f3fa2ee4b61cd479555b928ac1a17e3adc88a8bc0d0ec1ab3bee5cbad8abc21d8a7565df22d04f29c24a9ae
SSDEEP
768:9RoiMoqZOpQGSI9o/fFz1y85pN7HpB5D29msJ/3LcFkG0/BVEt2tvJHyEIRlJ5ek:fvxqZoQee1H4RJTcFWpqtYJMlPeBID
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE