DllRegisterServer
LUdr67
PwR73X
Static task
static1
Behavioral task
behavioral1
Sample
0814681613393556154154ded4bec81fbc2fa05b895c949fe8a914288dc958ef.dll
Resource
win7-20220812-en
Target
0814681613393556154154ded4bec81fbc2fa05b895c949fe8a914288dc958ef
Size
386KB
MD5
9e8b95a47595bdd269a946baf7ec7004
SHA1
aa485992b4d3e4fbff6332b89b8c8ee41e026c3e
SHA256
0814681613393556154154ded4bec81fbc2fa05b895c949fe8a914288dc958ef
SHA512
59c54113670e817a6ced3c6dc740db262b917f04a0402ae684a69cc5ca5e9f17c2abc5d6f5045faaffc96e6fa431e16656211acc42b5b48000717db5bb4a5d52
SSDEEP
6144:XtgTFlqteWTBa5WsoUReNsyLK9w8WqniKS9jyA9yjHHXsBcfmL/p+LIORL6qYFYM:d8z4TU5WsoURzN9dtniPHlQEFYM
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentDirectoryA
CreateFileA
DeleteFileA
FindFirstFileA
FindNextFileA
SetFilePointer
CloseHandle
GetLastError
ConnectNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
GetWindowsDirectoryA
VirtualAlloc
MapViewOfFile
GetProcAddress
CreateFileMappingA
LoadLibraryA
GetTempPathA
CreateNamedPipeA
DllRegisterServer
LUdr67
PwR73X
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ