?HookProc@@YGJHIJ@Z
GwDllRefresh
GwInitSysInfo
GwSdRefresh
GwSetText
Initialise
InstallHook
RemoveHook
SetTemperature
Static task
static1
Behavioral task
behavioral1
Sample
7aaea50fdcb0741cb0aec1984ed33aa4b6e21aa3b4512042522362015cdb7d01N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7aaea50fdcb0741cb0aec1984ed33aa4b6e21aa3b4512042522362015cdb7d01N.dll
Resource
win10v2004-20241007-en
Target
7aaea50fdcb0741cb0aec1984ed33aa4b6e21aa3b4512042522362015cdb7d01N
Size
221KB
MD5
198a7b5b86be35b324ddca839c5d2f80
SHA1
bb08947d016934f887fd548fb534c7d35c51cded
SHA256
7aaea50fdcb0741cb0aec1984ed33aa4b6e21aa3b4512042522362015cdb7d01
SHA512
cb96902f5d349623334de6676913cc11e657978c53c0b9728c0abc07a1e67618096bcd9e85ddcaee020ce192fe2159333d353d38c17b3a1ceda6ef74004cc708
SSDEEP
3072:VLovpG50bhpBLpnS3LUiEZcMhm46v/LJLUbfF+P5QD9f:VLov+ShRRiDsPUkfF5Z
Checks for missing Authenticode signature.
resource |
---|
7aaea50fdcb0741cb0aec1984ed33aa4b6e21aa3b4512042522362015cdb7d01N |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathCombineW
PathRemoveFileSpecW
DeleteCriticalSection
CloseHandle
CreateFileW
CreateEventA
LoadLibraryA
FreeLibrary
DeviceIoControl
GetModuleFileNameW
GetSystemDirectoryW
GetTickCount
GetModuleHandleW
LoadLibraryW
GetCurrentProcessId
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
IsBadReadPtr
QueryPerformanceCounter
Sleep
VirtualProtect
IsBadWritePtr
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
EnterCriticalSection
GetProcAddress
LeaveCriticalSection
OpenProcess
InitializeCriticalSection
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
FormatMessageW
GetCurrentProcess
SetUnhandledExceptionFilter
SetStdHandle
GetLocaleInfoW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
TerminateProcess
UnhandledExceptionFilter
InterlockedCompareExchange
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
InterlockedExchange
RtlUnwind
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
UnhookWindowsHookEx
CallNextHookEx
SetDoubleClickTime
GetDoubleClickTime
SetTimer
SetWindowsHookExW
ControlService
CloseServiceHandle
DeleteService
OpenProcessToken
StartServiceW
OpenServiceW
CreateServiceW
OpenSCManagerW
GetTokenInformation
DirectInput8Create
timeGetTime
GetProcessMemoryInfo
GetModuleBaseNameA
EnumProcessModules
?HookProc@@YGJHIJ@Z
GwDllRefresh
GwInitSysInfo
GwSdRefresh
GwSetText
Initialise
InstallHook
RemoveHook
SetTemperature
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ