EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
191b21cf08b32229acae7fa15ad8c659.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
191b21cf08b32229acae7fa15ad8c659.dll
Resource
win10v2004-20231215-en
Target
191b21cf08b32229acae7fa15ad8c659
Size
74KB
MD5
191b21cf08b32229acae7fa15ad8c659
SHA1
8f3107e260211af1af93cbc58fe201b47a131849
SHA256
e0e345e077637ad607146b0b9efa39582bbcbb8c9d155e46d3d39038b0704b06
SHA512
b80e193db9fa24ef961aa0539c03472d83064904ad3cc7d692be6e237dd10e90beaf07ed7c900e7c717badfc9339d4bbd3ccac20adf385076a6861fc31b25726
SSDEEP
768:HHV2l2FCB5rJ8XMneNHV2l2FCB5rJ8XMneNHV2l2FCB5rJ8XMneNHV2l2FCB5rJy:V2lT08ne2lT08ne2lT08ne2lT08n
Checks for missing Authenticode signature.
resource |
---|
191b21cf08b32229acae7fa15ad8c659 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetForegroundWindow
GetClassNameA
wsprintfA
lstrlenA
CloseHandle
CreateFileA
CreateThread
DisableThreadLibraryCalls
GetCurrentProcess
GetModuleFileNameA
GetPrivateProfileStringA
GetProcAddress
GetWindowsDirectoryA
GlobalAlloc
LoadLibraryA
MultiByteToWideChar
ReadFile
ReadProcessMemory
RtlMoveMemory
RtlZeroMemory
SetFileAttributesA
SetFilePointer
Sleep
TerminateProcess
VirtualProtectEx
WideCharToMultiByte
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
RegQueryValueExA
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ