DllInstall
FindCtxSectionGuidA
FindCtxSectionStringA
FindCtxSectionStringW
Behavioral task
behavioral1
Sample
aa73634ca325022dperf585dll.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
aa73634ca325022dperf585dll.dll
Resource
win10v2004-20231222-en
Target
aa73634ca325022dperf585dll.exe
Size
585KB
MD5
4525141d9e6e7b5a7f4e8c3db3f0c24c
SHA1
efbe18eb8a66e4b6289a5c53f22254f76e3a29bd
SHA256
aa73634ca325022dd6daff2df30484ec9031939044cf4c2a004cbdb66108281d
SHA512
122ec1390afd8cb9af85882c66a01a0bbef90a9962cf025368d8521d7e548b639c21c4cf1661fc6564e109b62d0e16999221560a3c95224c074130a4f6d117f8
SSDEEP
12288:SiTsYIHkC6xTp5SjYqwLTh8T4Ijx9xLIzLU5zCaH:BkkC6xLSjYqwLT6T4I9/L5zCaH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
ReleaseMutex
WaitForMultipleObjects
SetEvent
WriteFile
ReadFile
LeaveCriticalSection
EnterCriticalSection
WaitNamedPipeA
CreateFileA
InitializeCriticalSection
DeleteCriticalSection
ConnectNamedPipe
DisconnectNamedPipe
CancelIo
GetOverlappedResult
CreateNamedPipeA
CreateEventA
TerminateThread
ResumeThread
CreateThread
FreeLibraryAndExitThread
CreateFileW
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
GetCurrentThreadId
FlushInstructionCache
GetThreadContext
SetThreadContext
SuspendThread
GetCurrentThread
SetLastError
GlobalFree
GlobalUnlock
GlobalAlloc
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
UnmapViewOfFile
GetProcAddress
GetExitCodeThread
VirtualFreeEx
WaitForSingleObject
InterlockedIncrement
GlobalLock
GlobalSize
RemoveDirectoryA
FlushFileBuffers
SetFilePointer
GetFileSize
SetEndOfFile
MultiByteToWideChar
GetUserDefaultLangID
GetSystemDefaultLangID
GetComputerNameA
FindClose
FindNextFileA
GetDriveTypeA
FindFirstFileA
GetLogicalDriveStringsA
ExpandEnvironmentStringsA
HeapFree
HeapAlloc
GetProcessHeap
FreeLibrary
LoadLibraryA
DeleteFileW
GetShortPathNameA
DeleteFileA
GetEnvironmentVariableA
GlobalGetAtomNameA
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GlobalAddAtomA
SetStdHandle
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
CreateDirectoryA
GetTickCount
GetCurrentProcessId
GetCurrentProcess
GetLastError
LocalAlloc
CloseHandle
InterlockedDecrement
LocalFree
GlobalAddAtomW
InterlockedExchange
Sleep
GlobalDeleteAtom
GlobalFindAtomA
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
GetFullPathNameW
GetConsoleMode
GetVersionExA
GetModuleHandleA
GetStartupInfoA
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetDriveTypeW
FindFirstFileW
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
GetModuleHandleW
ExitProcess
GetFullPathNameA
GetCurrentDirectoryA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
HeapDestroy
VirtualFree
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStdHandle
SetHandleCount
GetFileType
GetConsoleCP
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
EnumWindows
CreateWindowExA
GetMessageA
DispatchMessageA
GetWindowTextLengthW
GetWindowTextW
wsprintfW
IsWindow
GetDC
GetWindowDC
ReleaseDC
GetClientRect
GetWindowRect
UnhookWindowsHookEx
SendMessageTimeoutA
SetWindowsHookExA
PostMessageA
DestroyWindow
PeekMessageA
TranslateMessage
CallNextHookEx
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
DeleteDC
GetDIBits
CreateCompatibleDC
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegCloseKey
GetUserNameA
FreeSid
CheckTokenMembership
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CreateStreamOnHGlobal
CoCreateInstance
VariantClear
DllInstall
FindCtxSectionGuidA
FindCtxSectionStringA
FindCtxSectionStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ