DllInstall
FindCtxSectionGuidA
FindCtxSectionStringA
FindCtxSectionStringW
Behavioral task
behavioral1
Sample
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a.dll
Resource
win11-20231215-en
Target
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a
Size
585KB
MD5
4582d9d2120fb9c80ef01e2135fa3515
SHA1
5da5079754d975d5b04342abf9d60bd0bae181a0
SHA256
57437a675cae8e71ac33cd2e001ca7ef1b206b028f3c810e884223a0369d2f8a
SHA512
9817c5a643bae89340dc4900851291866a3607e84c446f690032e64818c2a08483d056436206c55ea0eeb8b8f0c47761dcc976d08d75dee0df6580a8f18a6319
SSDEEP
12288:n1YswqlXRo/XlXSL4Fw+jo8x0cnmZMLU5tBgF8:1llXW/XRSL4Fw+jDx0cmT5DgF8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
ReleaseMutex
WaitForMultipleObjects
SetEvent
WriteFile
ReadFile
LeaveCriticalSection
EnterCriticalSection
WaitNamedPipeA
CreateFileA
InitializeCriticalSection
DeleteCriticalSection
ConnectNamedPipe
DisconnectNamedPipe
CancelIo
GetOverlappedResult
CreateNamedPipeA
CreateEventA
TerminateThread
ResumeThread
CreateThread
FreeLibraryAndExitThread
CreateFileW
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
GetCurrentThreadId
FlushInstructionCache
GetThreadContext
SetThreadContext
SuspendThread
GetCurrentThread
SetLastError
GlobalFree
GlobalUnlock
GlobalAlloc
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
UnmapViewOfFile
GetProcAddress
GetExitCodeThread
VirtualFreeEx
WaitForSingleObject
InterlockedIncrement
GlobalLock
GlobalSize
RemoveDirectoryA
FlushFileBuffers
SetFilePointer
GetFileSize
SetEndOfFile
MultiByteToWideChar
GetUserDefaultLangID
GetSystemDefaultLangID
GetComputerNameA
FindClose
FindNextFileA
GetDriveTypeA
FindFirstFileA
GetLogicalDriveStringsA
ExpandEnvironmentStringsA
HeapFree
HeapAlloc
GetProcessHeap
FreeLibrary
LoadLibraryA
DeleteFileW
GetShortPathNameA
DeleteFileA
GetEnvironmentVariableA
GlobalGetAtomNameA
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GlobalAddAtomA
SetStdHandle
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
CreateDirectoryA
GetTickCount
GetCurrentProcessId
GetCurrentProcess
GetLastError
LocalAlloc
CloseHandle
InterlockedDecrement
LocalFree
GlobalAddAtomW
InterlockedExchange
Sleep
GlobalDeleteAtom
GlobalFindAtomA
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
GetFullPathNameW
GetConsoleMode
GetVersionExA
GetModuleHandleA
GetStartupInfoA
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetDriveTypeW
FindFirstFileW
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
GetModuleHandleW
ExitProcess
GetFullPathNameA
GetCurrentDirectoryA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
HeapDestroy
VirtualFree
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStdHandle
SetHandleCount
GetFileType
GetConsoleCP
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
EnumWindows
CreateWindowExA
GetMessageA
DispatchMessageA
GetWindowTextLengthW
GetWindowTextW
wsprintfW
IsWindow
GetDC
GetWindowDC
ReleaseDC
GetClientRect
GetWindowRect
UnhookWindowsHookEx
SendMessageTimeoutA
SetWindowsHookExA
PostMessageA
DestroyWindow
PeekMessageA
TranslateMessage
CallNextHookEx
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
DeleteDC
GetDIBits
CreateCompatibleDC
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegCloseKey
GetUserNameA
FreeSid
CheckTokenMembership
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CreateStreamOnHGlobal
CoCreateInstance
VariantClear
DllInstall
FindCtxSectionGuidA
FindCtxSectionStringA
FindCtxSectionStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ