DllRegisterServer
XNfJb
Static task
static1
Behavioral task
behavioral1
Sample
JsUDviXDiDBFhx.dll
Resource
win7-20220812-en
Target
JsUDviXDiDBFhx.dll
Size
1.8MB
MD5
bce81d0fe5a5f2ec833b1890fa8a1cc5
SHA1
6c1e9bea7c9e7057ef40946abb97a3e60026a61c
SHA256
d70e30304c53b7b9f9f5d4409f0ac9b6713709d45fdc1f1bf65fe9f1ad539d1d
SHA512
de6ca51763ae07548208da7931f992d26ab357141d6a1b1d54f54f66f83a7317756f6a6ae8c0a47e9d379c15eb4eecf8596c12c70cd9e8c7f888b0d16d1a46c0
SSDEEP
24576:0N874KCVg2wUnXrUupzjXxbXQvHYOsmzOTp+U7pXXUL7SmI5y0fvFj1kqRIN3Qtt:0N87jcHwgXr5tToHYOsmSTx7pXkOy
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateFileA
GetFileSize
SetFilePointer
WriteFile
CloseHandle
HeapAlloc
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WaitForSingleObject
ExitProcess
CreateThread
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleA
SwitchToFiber
CreateFiber
ConvertThreadToFiber
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
InterlockedFlushSList
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetCurrentProcess
TerminateProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapFree
GetStdHandle
GetFileType
GetStringTypeW
GetACP
GetTimeZoneInformation
RaiseException
CompareStringW
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateFileW
DllRegisterServer
XNfJb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ