DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
5fe700677626f6dcc18f72f8a69a7fae40be814873d41acc61b38515608b635b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fe700677626f6dcc18f72f8a69a7fae40be814873d41acc61b38515608b635b.dll
Resource
win10v2004-20220812-en
Target
5fe700677626f6dcc18f72f8a69a7fae40be814873d41acc61b38515608b635b
Size
132KB
MD5
6e70bab0ea9825742984692eaab387d0
SHA1
7ecd21a7b82da3e56a93d3a94000812463d206c4
SHA256
5fe700677626f6dcc18f72f8a69a7fae40be814873d41acc61b38515608b635b
SHA512
a7dcba417ad85c98aec7196354068db69f811233a65de7dbc2c76e871beee2817a947a5f3c6670a824efa085fd2b004a14950b071013b16bc05fd2cadb3b70d4
SSDEEP
1536:oEMqoDFQKa+l8IbBHB+BgBBObFDxPKNp0JqcrFHHbVTGK:1m+KB9hSoBADsp0pVGK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE