DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
e5aa0b6fb338df9f1b215f2124aabf0ccf8232ac40c3344da0ac79a1946c8e6c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e5aa0b6fb338df9f1b215f2124aabf0ccf8232ac40c3344da0ac79a1946c8e6c.dll
Resource
win10v2004-20220812-en
Target
e5aa0b6fb338df9f1b215f2124aabf0ccf8232ac40c3344da0ac79a1946c8e6c
Size
132KB
MD5
c915ad5c8369c29d2d9c480cf4d38158
SHA1
35e3a3d8e28ce2462542dd717ab8b61a7131bb43
SHA256
e5aa0b6fb338df9f1b215f2124aabf0ccf8232ac40c3344da0ac79a1946c8e6c
SHA512
4eced771663cea04716f496e67ec28b549039d71a86503c83236d1fe94bc6c7f2c34bb5ec19806bb9d4c94fa89984d85027e8d10a6431d70a39472faa164cba0
SSDEEP
1536:w1MqHXnQowuS1Vuhnz5NBiFVCV+1Lft1PuA0/Wa:0r50gnz9iFN1LftAwa
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE