msimg64.new

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: be28c6f652f8097408344f431f6d784a

File Size: 1.3 MB

Uploaded At: March 28, 2026, 8:45 p.m.

Views: 12

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, WriteProcessMemory

Exported Functions

  • DllInitialize (Ordinal: 1, Address: 0x20a0)
  • DriverProc (Ordinal: 2, Address: 0x1e10)
  • InstallNTDSProvider (Ordinal: 3, Address: 0x20d0)
  • LpkDllInitialize (Ordinal: 4, Address: 0x20d0)
  • LpkDrawTextEx (Ordinal: 5, Address: 0x20d0)
  • LpkEditControl (Ordinal: 6, Address: 0x20d0)
  • LpkExtTextOut (Ordinal: 7, Address: 0x20d0)
  • LpkGetCharacterPlacement (Ordinal: 8, Address: 0x20d0)
  • LpkGetTextExtentExPoint (Ordinal: 9, Address: 0x20d0)
  • LpkInitialize (Ordinal: 10, Address: 0x20d0)
  • LpkPSMTextOut (Ordinal: 11, Address: 0x20d0)
  • LpkTabbedTextOut (Ordinal: 12, Address: 0x20d0)
  • LpkUseGDIWidthCache (Ordinal: 13, Address: 0x20d0)
  • NSPStartup (Ordinal: 14, Address: 0x20d0)
  • RemoveNTDSProvider (Ordinal: 15, Address: 0x20d0)
  • vSetDdrawflag (Ordinal: 16, Address: 0x2090)
  • widMessage (Ordinal: 17, Address: 0x1e60)
  • wodMessage (Ordinal: 18, Address: 0x1eb0)
  • AlphaBlend (Ordinal: 19, Address: 0x1f00)
  • GradientFill (Ordinal: 20, Address: 0x2040)
  • TransparentBlt (Ordinal: 21, Address: 0x1fa0)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x18000a0c0)
  • CreateFileW (Address: 0x18000a258)
  • DecodePointer (Address: 0x18000a128)
  • DeleteCriticalSection (Address: 0x18000a160)
  • DisableThreadLibraryCalls (Address: 0x18000a080)
  • EncodePointer (Address: 0x18000a120)
  • EnterCriticalSection (Address: 0x18000a078)
  • ExitProcess (Address: 0x18000a1c8)
  • FlsAlloc (Address: 0x18000a1b0)
  • FlsFree (Address: 0x18000a1a8)
  • FlsGetValue (Address: 0x18000a1a0)
  • FlsSetValue (Address: 0x18000a0d0)
  • FlushFileBuffers (Address: 0x18000a250)
  • FreeEnvironmentStringsW (Address: 0x18000a208)
  • GetACP (Address: 0x18000a188)
  • GetCommandLineA (Address: 0x18000a0d8)
  • GetConsoleCP (Address: 0x18000a170)
  • GetConsoleMode (Address: 0x18000a178)
  • GetCPInfo (Address: 0x18000a180)
  • GetCurrentProcess (Address: 0x18000a050)
  • GetCurrentProcessId (Address: 0x18000a228)
  • GetCurrentThreadId (Address: 0x18000a098)
  • GetEnvironmentStringsW (Address: 0x18000a210)
  • GetFileType (Address: 0x18000a150)
  • GetLastError (Address: 0x18000a0b8)
  • GetModuleFileNameA (Address: 0x18000a200)
  • GetModuleFileNameW (Address: 0x18000a1f0)
  • GetModuleHandleW (Address: 0x18000a008)
  • GetOEMCP (Address: 0x18000a190)
  • GetProcAddress (Address: 0x18000a028)
  • GetStartupInfoW (Address: 0x18000a158)
  • GetStdHandle (Address: 0x18000a148)
  • GetStringTypeW (Address: 0x18000a1f8)
  • GetSystemDirectoryW (Address: 0x18000a060)
  • GetSystemTimeAsFileTime (Address: 0x18000a230)
  • GetTickCount (Address: 0x18000a220)
  • GetVersion (Address: 0x18000a1d8)
  • HeapAlloc (Address: 0x18000a0a0)
  • HeapCreate (Address: 0x18000a1e0)
  • HeapDestroy (Address: 0x18000a1e8)
  • HeapFree (Address: 0x18000a0a8)
  • HeapReAlloc (Address: 0x18000a0c8)
  • HeapSetInformation (Address: 0x18000a1d0)
  • HeapSize (Address: 0x18000a238)
  • InitializeCriticalSection (Address: 0x18000a058)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18000a138)
  • IsDebuggerPresent (Address: 0x18000a090)
  • IsValidCodePage (Address: 0x18000a198)
  • LCMapStringW (Address: 0x18000a1b8)
  • LeaveCriticalSection (Address: 0x18000a068)
  • LoadLibraryW (Address: 0x18000a018)
  • lstrcatW (Address: 0x18000a088)
  • MultiByteToWideChar (Address: 0x18000a070)
  • QueryPerformanceCounter (Address: 0x18000a218)
  • RaiseException (Address: 0x18000a0e0)
  • ReadProcessMemory (Address: 0x18000a020)
  • RtlCaptureContext (Address: 0x18000a118)
  • RtlLookupFunctionEntry (Address: 0x18000a110)
  • RtlPcToFileHeader (Address: 0x18000a0e8)
  • RtlUnwindEx (Address: 0x18000a130)
  • RtlVirtualUnwind (Address: 0x18000a108)
  • SetFilePointer (Address: 0x18000a048)
  • SetHandleCount (Address: 0x18000a140)
  • SetLastError (Address: 0x18000a0b0)
  • SetStdHandle (Address: 0x18000a248)
  • SetUnhandledExceptionFilter (Address: 0x18000a100)
  • Sleep (Address: 0x18000a1c0)
  • TerminateProcess (Address: 0x18000a0f0)
  • UnhandledExceptionFilter (Address: 0x18000a0f8)
  • VirtualAllocEx (Address: 0x18000a030)
  • VirtualProtect (Address: 0x18000a038)
  • VirtualQuery (Address: 0x18000a000)
  • WideCharToMultiByte (Address: 0x18000a010)
  • WriteConsoleW (Address: 0x18000a240)
  • WriteFile (Address: 0x18000a168)
  • WriteProcessMemory (Address: 0x18000a040)