DllRegisterServer
KXI
MHx229
Tin22PP
Vaevy8305
Static task
static1
Behavioral task
behavioral1
Sample
defiant.db.dll
Resource
win7-20220812-en
Target
defiant.db.dll
Size
376KB
MD5
3fd6ff929bb62358cee961d45ff1471d
SHA1
0bc7646576d6c91e41670c87e9fdc404b27d6798
SHA256
1322398514f3a10bdf178bcebb73a261292ea16417161cda1b4d6130c8e88d7b
SHA512
a7f3d23ef5f9ef3ad483f4857c674f54c56cf1674cd69f29b54b08dc4f0d55e29f8f0e0de92627a9e097a45dd3e6c94e78bea6d26dea0ffbbe5cb89668c0226b
SSDEEP
6144:DT1WOGkH9+qJJHMl3yifLLi0epLihYRl/r82HV9kHpjFWBk3WScm2pQdfPnb4dRG:DsRw9DJpApXQRihGl/Zi8Qg1C
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetStdHandle
GetCurrentDirectoryA
CreateFileA
SetFilePointer
CloseHandle
GetLastError
PeekNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
WaitForSingleObject
ExitProcess
CreateThread
GetCurrentThreadId
GetSystemDirectoryA
VirtualAlloc
GetProcAddress
LoadLibraryA
CreateNamedPipeA
GetCurrentActCtx
DllRegisterServer
KXI
MHx229
Tin22PP
Vaevy8305
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ