DllRegisterServer
LUdr67
PwR73X
Static task
static1
Behavioral task
behavioral1
Sample
4507bde435282f2277254f3595c2b4fa+74751b7605877816b7905f6a53d6f12f542ab7c8+1eaa53c922c17a95affa749a81.dll
Resource
win7-20220812-en
Target
4507bde435282f2277254f3595c2b4fa+74751b7605877816b7905f6a53d6f12f542ab7c8+1eaa53c922c17a95affa749a81766f23541e78156d3dc3669069ef08a02f2875
Size
386KB
MD5
4507bde435282f2277254f3595c2b4fa
SHA1
74751b7605877816b7905f6a53d6f12f542ab7c8
SHA256
1eaa53c922c17a95affa749a81766f23541e78156d3dc3669069ef08a02f2875
SHA512
4c451d07ee35b863876cd9d64d12094b98fe32f32b384c28e02399ec6f8028520428bf10d26c13589b52289d5bcbcb5a11127c35d940452dfbccf1fb7a593e12
SSDEEP
6144:XtgTFlqteWTBa5WsoUReNsyLK9r8WqniKS9jyA9yjHHXsBcfmL/p+LIORL6qYFYM:d8z4TU5WsoURzN94tniPHlQEFYM
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentDirectoryA
CreateFileA
DeleteFileA
FindFirstFileA
FindNextFileA
SetFilePointer
CloseHandle
GetLastError
ConnectNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
GetWindowsDirectoryA
VirtualAlloc
MapViewOfFile
GetProcAddress
CreateFileMappingA
LoadLibraryA
GetTempPathA
CreateNamedPipeA
DllRegisterServer
LUdr67
PwR73X
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ