DllInstall
DllMain
Static task
static1
Behavioral task
behavioral1
Sample
fe1088ae920a2c4f1177056a928d6de49250d74a8c74b37af27608dc2de14451.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe1088ae920a2c4f1177056a928d6de49250d74a8c74b37af27608dc2de14451.dll
Resource
win10v2004-20220901-en
Target
fe1088ae920a2c4f1177056a928d6de49250d74a8c74b37af27608dc2de14451
Size
5.1MB
MD5
e02edb2ddfa6a9dec4aa18a5d3b416c8
SHA1
b83bdf7e104a5ecd932fe1ce9bdef01c47ec4ee6
SHA256
fe1088ae920a2c4f1177056a928d6de49250d74a8c74b37af27608dc2de14451
SHA512
3813ba904a16b815ab627237cdadee6f929c68b782b33e305402f63fc134ddfb4eef8a6841b341e85d2b5cd5eb2a0374ff636ec6b2c1df22c897c2c66d155ee4
SSDEEP
98304:UDm3KEKoipLZZed6v7+HUoqmX2bpHuSJkIWwLQbA8Km1cJ:Gmb3uq87+UmXmHny+m4
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTempFileNameW
CreateProcessW
GetTickCount
WriteFile
CreateFileW
GetTempPathW
CloseHandle
GetLastError
HeapFree
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
HeapAlloc
EncodePointer
DecodePointer
SetLastError
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
Sleep
EnterCriticalSection
LeaveCriticalSection
GetConsoleCP
GetConsoleMode
SetFilePointerEx
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetModuleFileNameW
LoadLibraryExW
RtlUnwind
HeapReAlloc
SetStdHandle
WriteConsoleW
GetStringTypeW
OutputDebugStringW
LoadLibraryW
HeapSize
LCMapStringW
FlushFileBuffers
DllInstall
DllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ