?HookProc@@YGJHIJ@Z
GwDllRefresh
GwInitSysInfo
GwSdRefresh
GwSetText
Initialise
InstallHook
RemoveHook
SetTemperature
Static task
static1
Behavioral task
behavioral1
Sample
360e7b16e7224af16d71e4ad2c79ecfc1577ebbd64b2aa74de2f828e917918c8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
360e7b16e7224af16d71e4ad2c79ecfc1577ebbd64b2aa74de2f828e917918c8.dll
Resource
win10v2004-20220812-en
Target
360e7b16e7224af16d71e4ad2c79ecfc1577ebbd64b2aa74de2f828e917918c8
Size
220KB
MD5
6193fc713f8bbd658ca973f008c90340
SHA1
151537281d563c9302d0fca0a63275c9fe108769
SHA256
360e7b16e7224af16d71e4ad2c79ecfc1577ebbd64b2aa74de2f828e917918c8
SHA512
71527db13e088502a352e5fa09339afbaa2beb674e8c0a4f7eba37738991e8ae47b2da0e62c3210e579d5bc958baa915d9ef0ea4dc183563d964d7cdffa57652
SSDEEP
3072:otTytAYLr774PnIPBiPINb5To49HhmRuozGjGR0Hq11j5juar:+ytREuAMb5kEyvzGjGR0Hq115
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathCombineW
PathRemoveFileSpecW
DeleteCriticalSection
CloseHandle
CreateFileW
CreateEventA
LoadLibraryA
FreeLibrary
DeviceIoControl
GetModuleFileNameW
GetSystemDirectoryW
GetTickCount
GetModuleHandleW
LoadLibraryW
GetCurrentProcessId
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetVersion
SetSystemTimeAdjustment
GetLastError
QueryPerformanceCounter
Sleep
VirtualProtect
IsBadReadPtr
IsBadWritePtr
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
EnterCriticalSection
GetProcAddress
LeaveCriticalSection
OpenProcess
InitializeCriticalSection
GetProcessHeap
HeapFree
HeapAlloc
GetSystemTimeAdjustment
SetUnhandledExceptionFilter
SetStdHandle
GetLocaleInfoW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
TerminateProcess
UnhandledExceptionFilter
InterlockedCompareExchange
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetSystemTimeAsFileTime
InterlockedExchange
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
UnhookWindowsHookEx
CallNextHookEx
SetDoubleClickTime
GetDoubleClickTime
SetTimer
SetWindowsHookExW
LookupPrivilegeValueA
CloseServiceHandle
DeleteService
ControlService
StartServiceW
OpenServiceW
CreateServiceW
OpenSCManagerW
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
timeGetTime
GetProcessMemoryInfo
GetModuleBaseNameA
EnumProcessModules
?HookProc@@YGJHIJ@Z
GwDllRefresh
GwInitSysInfo
GwSdRefresh
GwSetText
Initialise
InstallHook
RemoveHook
SetTemperature
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ