DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d.dll
Resource
win10v2004-en-20220112
Target
bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d
Size
594KB
MD5
775bff988c806a1334f2c1b40e861a9b
SHA1
6a223a2870f2b5540b63c61af2f6a186d3160677
SHA256
bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d
SHA512
3dd7a95306ed9bc74a2062785fd684176fc044a5a52fc322e46459ee9ab05f80d21d2deb4f166b48a3024b053472a637d763016a2ec344750d84cb582e2f96fe
SSDEEP
12288:8zG84H8ZcEnPA8T4GCircK7iR/w/DeeqpOCl6SPeqVhQQuv73G94xqCoDCd:GYcZC5scK7iRYDehOClZPeqfuTEsCCd
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetCommandLineA
LoadLibraryW
Sleep
CreateFileW
GetProcAddress
VirtualAlloc
VirtualProtect
CreateThread
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
GetLastError
HeapFree
HeapAlloc
EncodePointer
DecodePointer
RaiseException
SetLastError
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
WriteFile
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FreeLibrary
LoadLibraryExW
RtlUnwind
HeapReAlloc
OutputDebugStringW
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
VirtualQuery
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ