DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05.dll
Resource
win10v2004-en-20220113
Target
90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05
Size
591KB
MD5
140f6f9a6b3fb5c99b61c20afb6f39d7
SHA1
bb1136d16e8a203da7ed10426abd8fe475e7af97
SHA256
90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05
SHA512
51a5bb962600d3574bcd9d1daa274a17950f8bff5365514eddc6f01c39a6b36247a29ab7c7fc84fa2b171c2fdc32f70c8dd28143edbc7172955b95043c9f2573
SSDEEP
12288:mPXFajLPQ1hx3vE58ozKJP9rueIM2YM+X8CB6hgTYA:AVajM1hksP9XSxPQ6ho7
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetCommandLineA
LoadLibraryW
Sleep
CreateFileW
GetProcAddress
VirtualAlloc
VirtualProtect
CreateThread
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
GetLastError
HeapFree
HeapAlloc
EncodePointer
DecodePointer
RaiseException
SetLastError
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
WriteFile
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FreeLibrary
LoadLibraryExW
RtlUnwind
HeapReAlloc
OutputDebugStringW
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
VirtualQuery
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ