?HookProc@@YGJHIJ@Z
GwDllRefresh
GwInitSysInfo
GwSdRefresh
GwSetText
Initialise
InstallHook
RemoveHook
SetTemperature
Static task
static1
Behavioral task
behavioral1
Sample
9bc6dbce7033074ae96b68c2cd09dc78e4cc947a795b6c4e6eea83046b865e0b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9bc6dbce7033074ae96b68c2cd09dc78e4cc947a795b6c4e6eea83046b865e0b.dll
Resource
win10v2004-20220901-en
Target
9bc6dbce7033074ae96b68c2cd09dc78e4cc947a795b6c4e6eea83046b865e0b
Size
236KB
MD5
df052daf0e88948fb729dfc2ea560785
SHA1
14c00fcde42546aca4e84dcba7fdbd05141db773
SHA256
9bc6dbce7033074ae96b68c2cd09dc78e4cc947a795b6c4e6eea83046b865e0b
SHA512
f8a623c51f1656df0a10777ec539192a68424f78364a60112c5bd920bc89901ac6e4113ffd1cffb4dca4b04309796fa57710e292fd5c69bc95b4d1afc5d156f7
SSDEEP
3072:AmiseDsWoONnmcLz96xaLazkaLiVT/eUfzN5OTfRZUOmFMQLR93J:AmidpoXozjL4kaLiDt0TJZUXr
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathCombineW
PathStripPathW
PathFindFileNameW
PathRemoveFileSpecW
LeaveCriticalSection
GetProcAddress
EnterCriticalSection
GetModuleHandleA
DeleteCriticalSection
CloseHandle
CreateFileW
CreateEventA
LoadLibraryA
FreeLibrary
DeviceIoControl
GetModuleFileNameW
GetSystemDirectoryW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleW
LoadLibraryW
GetCurrentProcess
Sleep
GetSystemTime
OpenProcess
InitializeCriticalSectionAndSpinCount
IsBadReadPtr
QueryPerformanceCounter
VirtualProtect
WriteProcessMemory
GetModuleFileNameA
VirtualQueryEx
ReadProcessMemory
VirtualProtectEx
GetThreadContext
TerminateProcess
GetVersionExW
IsBadWritePtr
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
InitializeCriticalSection
GetProcessHeap
HeapFree
HeapAlloc
OutputDebugStringA
GetLastError
FormatMessageW
OutputDebugStringW
FlushFileBuffers
InterlockedCompareExchange
GetTempPathW
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
HeapDestroy
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
InterlockedExchange
RtlUnwind
CallNextHookEx
SetWindowsHookExW
GetDoubleClickTime
RegisterClassW
SetTimer
wvsprintfW
wvsprintfA
UnhookWindowsHookEx
SetDoubleClickTime
GetTokenInformation
CloseServiceHandle
DeleteService
ControlService
StartServiceW
OpenServiceW
CreateServiceW
OpenSCManagerW
OpenProcessToken
DirectInput8Create
timeGetTime
GetModuleFileNameExA
GetProcessMemoryInfo
GetModuleBaseNameA
EnumProcessModules
?HookProc@@YGJHIJ@Z
GwDllRefresh
GwInitSysInfo
GwSdRefresh
GwSetText
Initialise
InstallHook
RemoveHook
SetTemperature
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ