DllRegisterServer
LUdr67
PwR73X
Static task
static1
Behavioral task
behavioral1
Sample
f599ebc0863aa1f34ac82ff9c6530b077c3d2317633cf9e327850a0b951a7301.dll
Resource
win7-20220812-en
Target
f599ebc0863aa1f34ac82ff9c6530b077c3d2317633cf9e327850a0b951a7301
Size
386KB
MD5
fb8be7e574413897405025b8f6e6cf56
SHA1
b6b9358d963bf02687f5c674fc688d7e99f46d8a
SHA256
f599ebc0863aa1f34ac82ff9c6530b077c3d2317633cf9e327850a0b951a7301
SHA512
5703e8d9974f2f7f3bf8350589bd2e7b86cf65e58e783eb6e75898a1c39c5bf1c985792469404e38f6d3fd8df43f57ec8f06c60fae0100e8706fbcb818171e97
SSDEEP
6144:XtgTFlqteWTBa5WsoUReNsyLK9W8WqniKS9jyA9yjHHXsBcfmL/p+LIORL6qYFYM:d8z4TU5WsoURzN9ntniPHlQEFYM
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentDirectoryA
CreateFileA
DeleteFileA
FindFirstFileA
FindNextFileA
SetFilePointer
CloseHandle
GetLastError
ConnectNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
GetWindowsDirectoryA
VirtualAlloc
MapViewOfFile
GetProcAddress
CreateFileMappingA
LoadLibraryA
GetTempPathA
CreateNamedPipeA
DllRegisterServer
LUdr67
PwR73X
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ