DFXqm1889
DllInstall
DllRegisterServer
JYnV8U
NkzKT1Y8
SIHW052T
TzK86601
Static task
static1
Behavioral task
behavioral1
Sample
e84c9cf05be5c7911a553395bf6977b22078b3e74cd22afb98268831c2ecb77b.dll
Resource
win7-20220414-en
Target
e84c9cf05be5c7911a553395bf6977b22078b3e74cd22afb98268831c2ecb77b
Size
220KB
MD5
6730275f42a9e7011d4de313fa911d7c
SHA1
a2ab95e52ebbdb92fb7d3b30806030779cb3aef0
SHA256
0a70a89d7b7ac4048e3558f7cbc0023f425d8136b3d6e81ecdc56cc8769a0b59
SHA512
c53069fb02c5b98db8b5544e2bc2b2701246fb3a442f88299c9d90f8e07d8cc83441aeb705235d45afecd35eee05b4bc211c014658d908418456214e20157189
SSDEEP
6144:WK3Gj5ovr7IOjxfR9Y2HyJuOunhHb0w/n0vRN5:uSS2SJuO8Z0/5
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
FindFirstFileA
FindNextFileA
GetFileType
SetFileAttributesA
SetFilePointer
CloseHandle
PeekNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
ExitProcess
VirtualAlloc
MapViewOfFile
UnmapViewOfFile
GetProcAddress
CreateFileMappingA
LoadLibraryA
CreateNamedPipeA
GetCurrentActCtx
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
FindClose
FindFirstFileExA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
RaiseException
DFXqm1889
DllInstall
DllRegisterServer
JYnV8U
NkzKT1Y8
SIHW052T
TzK86601
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ