PUP.Gamehack.HGC

Analysis Report

General information

Family Name: PUP.Gamehack.HGC
Signature status: No Signature

Known Samples

MD5: d6b23f905d1cd9ee6ccc4d706989a766
SHA1: ae5a5ccef68a8ae28f3549ba653154fb0c989ab7
SHA256: 8C12670492CB6E7023626B118847FFA04482AA4B5B4EE8CDE0150092C55D6D67
File Size: 451.58 KB, 451584 bytes
MD5: 768e4da4999a8401a6c0d52f1764c0e8
SHA1: d44b45442d6d00890ce83e34c0456d71b575c663
SHA256: EEF88EE7195F14D522588B4B2585436200784CC3B6F405A9F3ACCFB3F4AB13D5
File Size: 392.70 KB, 392704 bytes
MD5: f33d0d7674f7d121c09b42149b0ef094
SHA1: c646ed57603aa221b22be76af0ef0e95eddc843f
SHA256: C94CA0B228D30C468818C70E063A0A2FA68CBE464619F25B375B3CCFD959796C
File Size: 1.46 MB, 1458176 bytes
MD5: 842f03c105e36d626918aeab3f80c9fc
SHA1: 43275d4127f798e441d6debf467be2225489d4b4
SHA256: FE9D80ACB404C19D331E7D47B6D52BD786E799E166484254F82157921B91230A
File Size: 948.74 KB, 948736 bytes
MD5: e8c1ff5a32800f867b59b98ab51f8c1f
SHA1: ca13d08f413084fc45e9954e83f33bbde2018c53
SHA256: 7B7A7F94070EC0463B9C3E5FE59A18732DCEE7701152E719B3EE7EF4DFFC1045
File Size: 375.30 KB, 375296 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name DentalMonitoring
File Description DM User Interface library
File Version 1.0.0.0
Internal Name DM_UI
Legal Copyright DM 2021-2022
Original Filename DM_UI.dll
Product Name DM_UI module
Product Version 1.0.0.0

File Traits

  • 2+ executable sections
  • dll
  • imgui
  • No Version Info
  • VirtualQueryEx
  • x86

Block Information

Total Blocks: 838
Potentially Malicious Blocks: 55
Whitelisted Blocks: 576
Unknown Blocks: 207

Visual Map

? 0 ? 0 ? ? 0 ? ? ? 0 ? ? ? ? 0 ? 0 ? 0 ? ? ? ? ? ? ? 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 x 0 ? 0 0 0 0 ? ? x ? x 0 0 0 0 ? 0 0 0 0 0 0 ? ? 0 ? 0 0 0 0 0 0 0 0 ? ? ? ? ? x x 0 0 0 0 0 0 0 x 0 0 x 0 x x x 0 x 0 x 0 x 0 0 ? 0 0 0 x 0 x x x 0 0 0 0 0 0 0 0 0 0 x x x x x 0 x 0 0 0 ? x x ? ? 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x 0 0 0 x 0 0 0 0 0 0 0 0 x 0 x 0 0 ? 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 ? 0 0 x x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 ? x ? 0 0 0 0 0 0 0 0 0 ? 0 0 ? x x 0 0 0 0 0 0 0 0 0 ? 0 0 x x 0 x ? 0 ? 0 0 0 0 0 ? 0 ? 0 ? ? 0 ? ? 0 0 ? ? 0 0 ? 0 0 0 0 0 0 0 ? 0 0 ? ? ? 0 ? ? ? ? ? 0 ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 ? ? 0 0 ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 ? ? 0 ? ? ? ? ? ? ? ? ? ? ? 0 0 ? 0 ? ? ? 0 ? ? ? ? 0 ? ? ? ? ? ? 0 0 ? ? ? ? x 0 ? ? 0 ? ? ? ? 0 ? ? ? ? ? ? 0 ? 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 ? 0 0 0 0 0 0 ? ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 1 0 0 0 0 1 1 2 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? 0 ? ? ? ? 0 ? ? ? 0 0 0 0 0 ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\downloads\errmesg.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\errmesg.txt Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKCU\system\currentcontrolset\control\mediaproperties\privateproperties\directinput\vid_0627&pid_0001\calibration\0::guid RegNtPreCreateKey
HKCU\software\microsoft\directinput\ae5a5ccef68a8ae28f3549ba653154fb0c989ab7_00004515846814bb390006e400::name AE5A5CCEF68A8AE28F3549BA653154FB0C989AB7_0000451584 RegNtPreCreateKey
HKCU\software\microsoft\directinput\ae5a5ccef68a8ae28f3549ba653154fb0c989ab7_00004515846814bb390006e400::usesmapper RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::name AE5A5CCEF68A8AE28F3549BA653154FB0C989AB7_0000451584 RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::id AE5A5CCEF68A8AE28F3549BA653154FB0C989AB7_00004515846814BB390006E400 RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::version RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::mostrecentstart RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\d44b45442d6d00890ce83e34c0456d71b575c663_0000392704.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\c646ed57603aa221b22be76af0ef0e95eddc843f_0001458176.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\43275d4127f798e441d6debf467be2225489d4b4_0000948736.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ca13d08f413084fc45e9954e83f33bbde2018c53_0000375296.,LiQMAxHB

Trending

Most Viewed

Loading...