DllRegisterServer
LUdr67
PwR73X
Static task
static1
Behavioral task
behavioral1
Sample
fd18b58235e50379b775cc3cbabdc8df599e71f787b2d286281999c24ecc18f8.dll
Resource
win7-20220812-en
Target
fd18b58235e50379b775cc3cbabdc8df599e71f787b2d286281999c24ecc18f8.dll
Size
384KB
MD5
1fa2068f08d1c55f06d6c33cb846f9ad
SHA1
e305efe7987be1a91cdf39daa6bd1b19bc8c694c
SHA256
fd18b58235e50379b775cc3cbabdc8df599e71f787b2d286281999c24ecc18f8
SHA512
c2a2b84e2549be4078397650470f40d7f1b3c7385eab182e91ee2af09aea429c307b778d16e7b5673a10946485ef1db790d21878a4f752ed59e3061687898764
SSDEEP
6144:OwWNVNYHWRZMZeiVt5p682MkWgylrBeKd5bYBWzjCvIuwDJnpCKHbrxOG53KPNs:Ol5eWt82Mk6lroKsLguiHOPNs
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentDirectoryA
CreateFileA
DeleteFileA
FindFirstFileA
FindNextFileA
SetFilePointer
CloseHandle
GetLastError
ConnectNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
GetWindowsDirectoryA
VirtualAlloc
MapViewOfFile
GetProcAddress
CreateFileMappingA
LoadLibraryA
GetTempPathA
CreateNamedPipeA
DllRegisterServer
LUdr67
PwR73X
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ