CPlApplet
DllInstall
DllRegisterServer
DllUnregisterServer
11-04-2022 12:46
220411-pzzc2aabg7 1011-04-2022 08:06
220411-jzv3qafca6 311-04-2022 08:02
220411-jxdewsfbe7 110-04-2022 10:22
220410-mekm2acge9 310-04-2022 10:21
220410-mdtjjshebm 110-04-2022 09:11
220410-k5l8facah7 310-04-2022 09:05
220410-k19syacae5 110-04-2022 08:57
220410-kwky1sbhh3 3Static task
static1
Behavioral task
behavioral1
Sample
MFMediaEngine.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
MFMediaEngine.dll
Resource
win10-20220310-en
Behavioral task
behavioral3
Sample
MFMediaEngine.dll
Resource
win10v2004-20220331-en
Behavioral task
behavioral4
Sample
MFMediaEngine.dll
Resource
win11-20220223-en
Target
MFMediaEngine.dll
Size
990KB
MD5
e0ecf5e7d2a4656457fabeee2918ef38
SHA1
ca05587d9bd333a62735705ba6b3f919ea7d6d17
SHA256
4eb85a5532b98cbc4a6db1697cf46b9e2b7e28e89d6bbfc137b36c0736cd80e2
SHA512
f2dc88e57feab0dcc8ad36dd313413d4735350343573f6c8721b5cae48a8ceff393dfd9bcf327d9eb4114347ad704de6dbcfffc42aa53876ba0b017011ac9ddc
SSDEEP
12288:gIgN+FmwpyU8PWyHc80gNO9kA5kA5kA5kAxMaskAZpq:gIgyp+WZ8zOtMHA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sleep
ExitProcess
GetPriorityClass
DisableThreadLibraryCalls
GlobalFree
LocalAlloc
LocalReAlloc
InitOnceExecuteOnce
GetConsoleCP
CreateFileW
CloseHandle
GetStringTypeW
SetFilePointerEx
SetStdHandle
DeleteCriticalSection
GetProcessHeap
InitializeCriticalSectionEx
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetLastError
UnhandledExceptionFilter
RaiseException
LocalFree
DecodePointer
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
GetStdHandle
LCMapStringW
WriteConsoleW
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
InterlockedFlushSList
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameW
LoadStringW
GetMessageTime
DestroyWindow
ShowWindow
DefWindowProcW
CreateFontIndirectW
GetStockObject
LookupAccountNameW
CveEventWrite
RevertToSelf
IsValidSid
IsValidAcl
IsTokenRestricted
InitializeAcl
ImpersonateLoggedOnUser
AllocateAndInitializeSid
SHFileOperationW
ExtractIconExW
SHSetLocalizedName
CoTaskMemAlloc
CoCancelCall
SHStrDupA
SHStrDupW
SHGetValueW
SHGetThreadRef
SHSetValueW
RpcExceptionFilter
UuidCreate
WindowsIsStringEmpty
WindowsGetStringRawBuffer
WindowsCreateString
WindowsCreateStringReference
SetupCloseInfFile
SetupOpenInfFileW
SetupOpenAppendInfFileW
GetFileVersionInfoSizeW
GetFileVersionInfoW
CPlApplet
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ