?HookProc@@YGJHIJ@Z
GwDllRefresh
GwInitSysInfo
GwSdRefresh
GwSetText
Initialise
InstallHook
RemoveHook
SetTemperature
Static task
static1
Behavioral task
behavioral1
Sample
a233f6d08d021f753aeee7c90a8612f3.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a233f6d08d021f753aeee7c90a8612f3.dll
Resource
win10v2004-20240221-en
Target
a233f6d08d021f753aeee7c90a8612f3
Size
227KB
MD5
a233f6d08d021f753aeee7c90a8612f3
SHA1
85786a742a355402621f9e89fe929f7866b51493
SHA256
e966f4890139947dff1aafc755f4dbd28d5cd87c64bca37a8c999a9241cc7185
SHA512
ab1178a66efbe91d030b912fc1fc13d42208adcd1f40259e20feb803f4f9ace075fee845fb6210ab6e1abe59f3fce3b120454a3cc03021d643d8baa3d7800888
SSDEEP
3072:Z6hTGAEo/HQFBNNvUC9VnZ8ZVWtdvl3PbL9iIEExm5vkjj:ETGAxOiOVnZGVWr93FEE6k
Checks for missing Authenticode signature.
resource |
---|
a233f6d08d021f753aeee7c90a8612f3 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathRemoveFileSpecW
PathCombineW
PathStripPathW
GetModuleHandleA
DeleteCriticalSection
CloseHandle
CreateFileW
CreateEventA
LoadLibraryA
FreeLibrary
DeviceIoControl
GetModuleFileNameW
GetSystemDirectoryW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleW
LoadLibraryW
GetCurrentProcess
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
IsBadReadPtr
QueryPerformanceCounter
Sleep
VirtualProtect
IsBadWritePtr
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetProcAddress
LeaveCriticalSection
OpenProcess
InitializeCriticalSection
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
FormatMessageW
InterlockedCompareExchange
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
HeapDestroy
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
InterlockedExchange
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
CallNextHookEx
UnhookWindowsHookEx
GetDoubleClickTime
RegisterClassW
SetTimer
SetDoubleClickTime
SetWindowsHookExW
ControlService
CloseServiceHandle
DeleteService
OpenProcessToken
StartServiceW
OpenServiceW
CreateServiceW
OpenSCManagerW
GetTokenInformation
DirectInput8Create
timeGetTime
GetModuleBaseNameA
EnumProcessModules
GetProcessMemoryInfo
?HookProc@@YGJHIJ@Z
GwDllRefresh
GwInitSysInfo
GwSdRefresh
GwSetText
Initialise
InstallHook
RemoveHook
SetTemperature
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ