× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ad6304a559bbbed68f00bb5226a6c83802a65562ea35245f6719cce82b23966d
File name: YXljL8XPAjn.dll
Detection ratio: 10 / 56
Analysis date: 2016-10-07 06:01:42 UTC ( 2 years, 4 months ago ) View latest
Antivirus Result Update
Avira (no cloud) TR/Crypt.EPACK.Gen2 20161006
Baidu Win32.Trojan.WisdomEyes.151026.9950.9999 20161001
Bkav HW32.Packed.4398 20161006
Comodo MalCrypt.Indus! 20161007
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20160725
Sophos ML trojan.win32.miuref.f 20160928
McAfee-GW-Edition BehavesLike.Win32.Ramnit.cc 20161006
Qihoo-360 HEUR/QVM39.1.0000.Malware.Gen 20161007
Symantec Heur.AdvML.B 20161007
Tencent Win32.Trojan.Raas.Auto 20161007
Ad-Aware 20161007
AegisLab 20161007
AhnLab-V3 20161006
Alibaba 20161003
ALYac 20160930
Antiy-AVL 20161007
Arcabit 20161007
Avast 20161007
AVG 20161007
AVware 20161007
BitDefender 20161007
CAT-QuickHeal 20161007
ClamAV 20161007
CMC 20161003
Cyren 20161007
DrWeb 20161007
Emsisoft 20161007
ESET-NOD32 20161007
F-Prot 20161007
F-Secure 20161007
Fortinet 20161007
GData 20161007
Ikarus 20161006
Jiangmin 20161007
K7AntiVirus 20161006
K7GW 20161007
Kaspersky 20161007
Kingsoft 20161007
Malwarebytes 20161007
McAfee 20161007
Microsoft 20161007
eScan 20161007
NANO-Antivirus 20161007
nProtect 20161007
Panda 20161006
Rising 20161007
Sophos AV 20161006
SUPERAntiSpyware 20161007
TheHacker 20161007
TrendMicro 20161007
TrendMicro-HouseCall 20161007
VBA32 20161006
VIPRE 20161007
ViRobot 20161007
Yandex 20161005
Zillya 20161003
Zoner 20161007
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-10-06 16:45:34
Entry Point 0x0000A000
Number of sections 7
PE sections
PE imports
RegCreateKeyExW
CryptDestroyKey
RegCloseKey
RegDeleteKeyW
RegQueryValueExA
RegCreateKeyW
CryptVerifySignatureW
LookupPrivilegeValueW
RegEnumKeyW
RegRestoreKeyW
CryptHashData
RegQueryValueExW
CryptCreateHash
RegOpenKeyA
OpenProcessToken
RegOpenKeyExW
RegOpenKeyW
RegOpenKeyExA
RegQueryValueW
CryptReleaseContext
CryptGetUserKey
RegQueryInfoKeyW
RegEnumKeyExW
CryptAcquireContextW
GetUserNameA
CryptDestroyHash
OpenThreadToken
RegDeleteValueW
RegSetValueExW
GetSaveFileNameW
CommDlgExtendedError
GetFileTitleW
SetGraphicsMode
Polygon
TextOutW
CreateFontIndirectW
GetGlyphOutlineW
CreatePen
SaveDC
SetTextAlign
GetTextMetricsA
CombineRgn
GetClipBox
ModifyWorldTransform
GetPixel
Rectangle
SetMapMode
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
SetWorldTransform
RestoreDC
SetBkMode
GetCharacterPlacementW
ScaleWindowExtEx
CreateDCW
SelectObject
DeleteObject
GetObjectW
BitBlt
CreateDIBSection
RealizePalette
SetTextColor
CreatePatternBrush
GetBrushOrgEx
GetClipRgn
ExtTextOutW
GetOutlineTextMetricsA
CreateBitmap
SetPixelV
CreatePalette
GetStockObject
SetViewportOrgEx
SelectPalette
SetBkColor
PtVisible
GetDIBits
EnumFontFamiliesExW
ExtCreateRegion
GdiFlush
ScaleViewportExtEx
SelectClipRgn
CreateCompatibleDC
CreateFontW
GetBkColor
SetBrushOrgEx
CreateRectRgn
SetViewportExtEx
SetPolyFillMode
Ellipse
SetWindowExtEx
CreateSolidBrush
Escape
GetFontData
GetTextExtentPoint32W
CreateCompatibleBitmap
RectVisible
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
CreatePipe
GetCurrentProcess
GetConsoleMode
SetErrorMode
GetLogicalDrives
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
WideCharToMultiByte
GetStringTypeA
GetSystemTimeAsFileTime
GetStringTypeW
GetOEMCP
FormatMessageW
GetExitCodeProcess
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
MoveFileW
GetFullPathNameW
GetSystemTime
DeviceIoControl
CopyFileW
RemoveDirectoryW
ExitProcess
GetModuleFileNameA
SetProcessWorkingSetSize
GetVolumeInformationW
MultiByteToWideChar
SetFilePointerEx
GetSystemPowerStatus
FormatMessageA
CreateEventW
GlobalAddAtomW
CreateThread
DeleteCriticalSection
GetExitCodeThread
ConvertDefaultLocale
CreateMutexW
ExitThread
WriteConsoleA
SetCurrentDirectoryW
LocalFileTimeToFileTime
GetDiskFreeSpaceExW
SetEndOfFile
GetVersion
WriteConsoleW
SetHandleCount
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
RtlUnwind
GlobalFindAtomW
GetStartupInfoA
UnlockFile
OpenProcess
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
GetProcessHeap
GetTempFileNameW
CompareStringW
GetFileInformationByHandle
FindNextFileW
GetComputerNameA
FindFirstFileW
GetTimeZoneInformation
TlsSetValue
CreateFileA
GlobalGetAtomNameW
SystemTimeToFileTime
GlobalDeleteAtom
HeapCreate
GetSystemInfo
lstrlenA
GetConsoleCP
GetThreadLocale
GetEnvironmentStringsW
LockFile
GetCPInfo
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
GetCurrentThread
ExpandEnvironmentStringsW
ReleaseSemaphore
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
FreeResource
GetFileAttributesExW
SizeofResource
UnmapViewOfFile
FindResourceW
VirtualFree
Sleep
VarUI4FromStr
VariantChangeType
LoadRegTypeLib
VariantTimeToSystemTime
SafeArrayGetElement
SystemTimeToVariantTime
RegisterTypeLib
SafeArrayGetDim
VariantClear
SysAllocString
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetVartype
UnRegisterTypeLib
SafeArrayGetLBound
LoadTypeLib
SysFreeString
SafeArrayCopy
VariantInit
SysStringLen
GetModuleBaseNameW
EnumProcesses
EnumProcessModules
SHGetFolderLocation
SHQueryRecycleBinW
SHEmptyRecycleBinW
SHCreateDirectoryExW
SHBrowseForFolderW
DragQueryFileW
Shell_NotifyIconW
SHGetDesktopFolder
SHGetPathFromIDListW
ExtractIconExW
SHFileOperationW
SHGetMalloc
CommandLineToArgvW
DragFinish
RedrawWindow
GetMessagePos
RegisterWindowMessageW
UnregisterHotKey
SetMenuItemBitmaps
LoadBitmapW
MoveWindow
DestroyMenu
PostQuitMessage
SetWindowPos
IsWindow
GrayStringW
EndPaint
EndDialog
WindowFromPoint
GetMessageTime
SetMenuItemInfoW
SetActiveWindow
DispatchMessageW
GetAsyncKeyState
ReleaseDC
GetMenuStringW
SendMessageW
UnregisterClassA
SendMessageA
UnregisterClassW
GetClientRect
GetMenuItemInfoW
SetCaretPos
AllowSetForegroundWindow
DrawTextW
GetNextDlgTabItem
InSendMessage
CallNextHookEx
CharUpperA
GetTopWindow
RegisterHotKey
MapVirtualKeyExW
EnumClipboardFormats
GetWindowTextLengthW
LoadAcceleratorsW
GetActiveWindow
GetMenuItemID
PtInRect
DrawEdge
GetParent
UpdateWindow
GetPropW
EqualRect
CreateCaret
GetWindowTextW
GetMessageW
ShowWindow
GetCaretPos
DrawFrameControl
SetPropW
EnumDisplayMonitors
PeekMessageW
InsertMenuItemW
CharUpperW
MapWindowPoints
RemovePropW
LoadIconW
TranslateMessage
IsWindowEnabled
GetWindow
DestroyCaret
SetClipboardData
GetIconInfo
MsgWaitForMultipleObjects
SetParent
RegisterClassW
GetWindowPlacement
LoadStringW
SetWindowLongW
EnableMenuItem
TrackPopupMenuEx
GetSubMenu
SetTimer
IsDialogMessageW
FillRect
CopyRect
GetSysColorBrush
GetDialogBaseUnits
GetClassInfoW
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetCursorPos
CharNextW
DragDetect
SetFocus
VkKeyScanExW
GetMonitorInfoW
BeginPaint
OffsetRect
DefWindowProcW
DrawIcon
KillTimer
TrackMouseEvent
GetComboBoxInfo
CharPrevW
GetClipboardData
GetClassInfoExW
SendDlgItemMessageA
GetSystemMetrics
IsIconic
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
DrawTextExW
ShowOwnedPopups
SendDlgItemMessageW
PostMessageW
InvalidateRect
CheckDlgButton
CreatePopupMenu
CheckMenuItem
DrawFocusRect
GetClassLongW
GetLastActivePopup
SetWindowTextW
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ClientToScreen
TrackPopupMenu
PostThreadMessageW
GetMenuItemCount
GetMenuState
SetWindowsHookExW
LoadCursorW
GetSystemMenu
ReuseDDElParam
GetDC
InsertMenuW
SetForegroundWindow
OpenClipboard
EmptyClipboard
GetCaretBlinkTime
CreateDialogIndirectParamW
IntersectRect
SetLayeredWindowAttributes
GetScrollInfo
GetKeyboardLayout
FindWindowW
GetCapture
GetDlgCtrlID
ScreenToClient
MessageBeep
LoadMenuW
RemoveMenu
DeferWindowPos
BeginDeferWindowPos
MessageBoxW
GetMenu
RegisterClassExW
UnhookWindowsHookEx
SetRectEmpty
DialogBoxIndirectParamW
AppendMenuW
GetWindowDC
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
UpdateLayeredWindow
GetDoubleClickTime
DestroyIcon
IsWindowVisible
WinHelpW
GetDesktopWindow
UnpackDDElParam
SystemParametersInfoW
FrameRect
SetRect
DeleteMenu
MonitorFromRect
CallWindowProcW
GetClassNameW
DestroyWindow
ModifyMenuW
ValidateRect
IsRectEmpty
GetFocus
EnableWindow
CloseClipboard
TranslateAcceleratorW
SetMenu
SetCursor
InternetTimeFromSystemTimeW
HttpQueryInfoW
InternetSetOptionW
InternetConnectW
InternetReadFile
InternetCloseHandle
InternetTimeToSystemTimeW
HttpSendRequestW
InternetOpenW
InternetErrorDlg
InternetGetConnectedState
InternetGetLastResponseInfoW
HttpOpenRequestW
HttpAddRequestHeadersW
mixerGetLineControlsW
mixerGetControlDetailsW
mciGetErrorStringW
mixerOpen
mixerSetControlDetails
mciSendCommandW
mixerClose
mixerGetDevCapsW
mixerGetLineInfoW
GdipDrawImageRectRect
GdipGetFontStyle
GdipDrawRectangleI
GdipSetClipRect
GdipSaveGraphics
GdipGetGenericFontFamilySansSerif
GdipTranslateMatrix
GdipSetPenBrushFill
GdipCreateBitmapFromScan0
GdipGetImageVerticalResolution
GdipDisposeImage
GdipImageSelectActiveFrame
GdipGetFamilyName
GdipGetFontSize
GdipGetCompositingMode
GdipGetTextRenderingHint
GdipGetCellAscent
GdipGetClipBounds
GdipSetStringFormatAlign
GdipImageGetFrameCount
GdipGetImageWidth
GdipDrawImageI
GdipDrawImageRectRectI
GdipCreateFont
GdipCloneBrush
GdipCloneStringFormat
GdipCreateLineBrushFromRectWithAngleI
GdipFree
GdipGetImageRawFormat
GdipGetImageHeight
GdipDeleteStringFormat
GdipTranslateWorldTransform
GdipSetPenDashStyle
GdipSetTextRenderingHint
GdipCreateBitmapFromHICON
GdipGetImageHorizontalResolution
GdipSetImageAttributesColorMatrix
GdipSaveImageToFile
GdipMeasureString
GdipTransformMatrixPoints
GdipBitmapSetResolution
GdiplusStartup
GdipGetFamily
GdipFillPath
GdipCreateBitmapFromStream
GdipGetImageThumbnail
GdipGetImageEncoders
GdipFillRectangleI
GdipDisposeImageAttributes
GdipSetCompositingMode
GdipClosePathFigure
GdipCreateMatrix
GdipDrawLine
GdipRotateMatrix
GdipGetImageGraphicsContext
GdipRestoreGraphics
GdipGetImageEncodersSize
GdipBitmapLockBits
GdipClonePen
GdipGetCellDescent
GdipStringFormatGetGenericDefault
GdipDrawPath
GdipDeleteFontFamily
GdipCloneFontFamily
GdipCreatePath
GdipBitmapUnlockBits
GdipFillRectangle
GdipDeleteFont
GdipSetPixelOffsetMode
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipDrawLineI
GdipBitmapGetPixel
GdipCreateFontFamilyFromName
GdipSetStringFormatFlags
GdipDeleteBrush
GdipRotateWorldTransform
GdipInvertMatrix
GdipAddPathArcI
GdipSetMatrixElements
GdipSetClipRectI
GdipStringFormatGetGenericTypographic
GdipGetStringFormatFlags
GdipGetClipBoundsI
GdipGetImagePixelFormat
GdipCreateSolidFill
GdipSetSmoothingMode
GdipSetStringFormatTrimming
GdipGetEmHeight
GdipGetDC
GdipDeleteMatrix
GdipGetLineSpacing
GdipDeleteGraphics
GdipTransformPath
GdipCreateImageAttributes
GdipCreateFromHDC
GdipCreatePen1
GdipDrawRectangle
GdipAlloc
GdipDeletePath
GdipDeletePen
GdipSetInterpolationMode
GdipDrawString
GdipCloneImage
GdipReleaseDC
isdigit
malloc
exit
free
_wtoi
CreateStreamOnHGlobal
OleLockRunning
CoUninitialize
CoInitialize
OleInitialize
CoRevokeClassObject
CoLockObjectExternal
OleSetContainedObject
RegisterDragDrop
CLSIDFromProgID
CoTaskMemRealloc
CoCreateInstance
RevokeDragDrop
CoRegisterClassObject
CoCreateInstanceEx
CoCreateGuid
CLSIDFromString
CoTaskMemFree
StringFromGUID2
CoTaskMemAlloc
SnmpUtilOidCpy
SnmpUtilOidNCmp
SnmpUtilVarBindFree
CreateURLMonikerEx
Number of PE resources by type
RT_ICON 7
RT_GROUP_ICON 2
RT_RCDATA 1
Number of PE resources by language
ENGLISH US 10
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2016:10:06 17:45:34+01:00

FileType
Win32 DLL

PEType
PE32

CodeSize
39424

LinkerVersion
8.0

FileTypeExtension
dll

InitializedDataSize
218112

SubsystemVersion
4.1

EntryPoint
0xa000

OSVersion
4.1

ImageVersion
8.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 3ff42fb404ab741d750079b5be4dec5f
SHA1 4d9314b9f0db54ef61aec38ce93b04df41202f6a
SHA256 ad6304a559bbbed68f00bb5226a6c83802a65562ea35245f6719cce82b23966d
ssdeep
3072:LBGnfz8ZqJMDf+LuXr1ILeL6D70KV6qyhNSiOxedW4:L4nfwZqO3iMM0gbiOxqW4

authentihash 66ac2ada42bec503ec0ad1213fc68200f5d85d31d1ef852341bdbf310fced35d
imphash 0cfae1b4de9d6f95279deb97f2566624
File size 180.5 KB ( 184832 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
pedll

VirusTotal metadata
First submission 2016-10-07 06:01:42 UTC ( 2 years, 4 months ago )
Last submission 2016-10-10 00:29:24 UTC ( 2 years, 4 months ago )
File names YXljL8XPAjn.dll
YXljL8XPAjn.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!