DFXqm1889
DllInstall
DllRegisterServer
JYnV8U
NkzKT1Y8
SIHW052T
TzK86601
Static task
static1
Behavioral task
behavioral1
Sample
300b63a80f20b96567bf5ccbb4863b9a06a4e12ceaa5d458d0e6967c527b575f.dll
Resource
win7-20220414-en
Target
300b63a80f20b96567bf5ccbb4863b9a06a4e12ceaa5d458d0e6967c527b575f
Size
220KB
MD5
1c6ba04b3d16b049e9c8ed4116d68e57
SHA1
cda2179a760a6fba289649d9d71fab1c9ab876c6
SHA256
18516ee748b80ba151ac8e61bc92ad490e73f98254fc58b3e170d0450cb3e8df
SHA512
972a5483c4a0ff82087d623e18604b1e6673cdd9f516f3da0b1557c7d730a52bbbcf7416251fd48ed9430a998a6a62544eac1d5d68340a80ec143640b89b1916
SSDEEP
6144:EK3Gj5ovr7IOjxfR9Y2HyJuOun6t0A5pdID/ADYw:wSS2SJuOrD5tl
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
FindFirstFileA
FindNextFileA
GetFileType
SetFileAttributesA
SetFilePointer
CloseHandle
PeekNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
ExitProcess
VirtualAlloc
MapViewOfFile
UnmapViewOfFile
GetProcAddress
CreateFileMappingA
LoadLibraryA
CreateNamedPipeA
GetCurrentActCtx
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
FindClose
FindFirstFileExA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
RaiseException
DFXqm1889
DllInstall
DllRegisterServer
JYnV8U
NkzKT1Y8
SIHW052T
TzK86601
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ