DllInstall
DllMain
Static task
static1
Behavioral task
behavioral1
Sample
6e2840bf84f544f0025ca4b816790edde653981d12b4c09fe463a6976cc8a373.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e2840bf84f544f0025ca4b816790edde653981d12b4c09fe463a6976cc8a373.dll
Resource
win10v2004-20220901-en
Target
6e2840bf84f544f0025ca4b816790edde653981d12b4c09fe463a6976cc8a373
Size
5.1MB
MD5
8073ef24dc968f3a0834cb6670b3fbce
SHA1
0947e55f6f8db9ec6dfac84d940919efdae478ba
SHA256
6e2840bf84f544f0025ca4b816790edde653981d12b4c09fe463a6976cc8a373
SHA512
7eb0e7e917db4c0be5c4350fb7609e7e80847430e3e899da9175ebdb58f067a060bce11972599d6c698101a0f4c6ca48ef762ae483deed7301890dfcb78cb465
SSDEEP
98304:wPnsXzRLQVM0qgx9AAar3BswCeUyBihgPPpeZw3Axliriox4/2WWhYOdH98Mr:azaNLUy6gPLQxlZ/6Yw
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTempFileNameW
CreateProcessW
GetTickCount
WriteFile
CreateFileW
GetTempPathW
CloseHandle
GetLastError
HeapFree
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
HeapAlloc
EncodePointer
DecodePointer
SetLastError
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
Sleep
EnterCriticalSection
LeaveCriticalSection
GetConsoleCP
GetConsoleMode
SetFilePointerEx
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetModuleFileNameW
LoadLibraryExW
RtlUnwind
HeapReAlloc
SetStdHandle
WriteConsoleW
GetStringTypeW
OutputDebugStringW
LoadLibraryW
HeapSize
LCMapStringW
FlushFileBuffers
DllInstall
DllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ