DFXqm1889
DllInstall
DllRegisterServer
JYnV8U
NkzKT1Y8
SIHW052T
TzK86601
Static task
static1
Behavioral task
behavioral1
Sample
069cafd6d66c499bb9a048475cd0337147e6f041a26139e8233c07110fdd9c1a.dll
Resource
win7-20220414-en
Target
069cafd6d66c499bb9a048475cd0337147e6f041a26139e8233c07110fdd9c1a
Size
220KB
MD5
ff53f5dc2ffca32ec3b0c9a3f041eba3
SHA1
126f6c8c6136feb062d21be546feac8be16b513c
SHA256
85dc0f6764b62c6464443ebdfcb1ceda598f060b433d33d3aba880cafb2e174e
SHA512
24e79a95247b31748e0ff97c8da6cab9598ad54424d6898edd28c66524b300b065e8d28539f7700bd965716576c1ec64a56b2a161782830d2d42b03f1bba6558
SSDEEP
6144:KK3Gj5ovr7IOjxfR9Y2HyJuOunLKjznwMf:KSS2SJuODnwMf
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
FindFirstFileA
FindNextFileA
GetFileType
SetFileAttributesA
SetFilePointer
CloseHandle
PeekNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
ExitProcess
VirtualAlloc
MapViewOfFile
UnmapViewOfFile
GetProcAddress
CreateFileMappingA
LoadLibraryA
CreateNamedPipeA
GetCurrentActCtx
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
FindClose
FindFirstFileExA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
RaiseException
DFXqm1889
DllInstall
DllRegisterServer
JYnV8U
NkzKT1Y8
SIHW052T
TzK86601
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ