?Hook@@YA_NPAUHWND__@@@Z
?UnHook@@YA_NPAUHWND__@@@Z
?WM_HOOK_KEY@@3IA
?WM_HOOK_RUN@@3IA
?WM_HOOK_WRITE@@3IA
Static task
static1
Behavioral task
behavioral1
Sample
1cb0d2947f1092eefd03996843ee77fc.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cb0d2947f1092eefd03996843ee77fc.dll
Resource
win10v2004-20231215-en
Target
1cb0d2947f1092eefd03996843ee77fc
Size
26KB
MD5
1cb0d2947f1092eefd03996843ee77fc
SHA1
133a461097e5580c969a6a4d35c60f8511f64785
SHA256
e8d9ebb11d6f74342355619fa44e16f0289acd62187e934a1ed110c8e0600bc9
SHA512
f15007d02d48b39a1c3946a4b67addbf72e99073789fe8fc404de27fe18e9faaaa9359e22d68b7beddf63b5c5d22b2e5b74b84dfcf72b1a2873b9a0788fbacf5
SSDEEP
384:sG2yCZdUw2/tgbcEXRSbuj1PM0VfdaO4ELG22ceeDvul3ZQ:sG51w2FNq1PM0VVaELxJWlJQ
Checks for missing Authenticode signature.
resource |
---|
1cb0d2947f1092eefd03996843ee77fc |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
FreeLibrary
LoadLibraryA
GetModuleFileNameA
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
HeapAlloc
ExitProcess
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
UnhandledExceptionFilter
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemInfo
IsWindow
GetWindowThreadProcessId
SetWindowsHookExA
SendMessageA
UnhookWindowsHookEx
SetWindowLongA
CallNextHookEx
GetKeyboardState
SetKeyboardState
MapVirtualKeyA
PostMessageA
GetKeyState
CallWindowProcA
RegisterWindowMessageA
?Hook@@YA_NPAUHWND__@@@Z
?UnHook@@YA_NPAUHWND__@@@Z
?WM_HOOK_KEY@@3IA
?WM_HOOK_RUN@@3IA
?WM_HOOK_WRITE@@3IA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ