_Prog_HookAllApps@8
fnDLL
fnFND
Static task
static1
Behavioral task
behavioral1
Sample
138b85c85157ba932435f908c18cbd3e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
138b85c85157ba932435f908c18cbd3e.dll
Resource
win10v2004-20231222-en
Target
138b85c85157ba932435f908c18cbd3e
Size
152KB
MD5
138b85c85157ba932435f908c18cbd3e
SHA1
3c54256822e2436cda65143d42f1c76abd0a24f7
SHA256
46cc52edeb184b0e18d8f6fa897f2c727b17bdc7bb72a6dba8ba69d5311182c9
SHA512
c2de12df59151e1e877c3265dc5457ee6968f0d87078808c6f8fc1b9035585c91cd3be7284d66eb1c115ca58a345a705e8d766d18bd83162df9844852dc00291
SSDEEP
96:4RB8ayUPbS3lZCa9AlOlClRjlBJeYUe2NFf+nLzce6BIWB0+HuKq82KGL:4TTyqbSQPYYf2N0nK0+3q82KG
Checks for missing Authenticode signature.
resource |
---|
138b85c85157ba932435f908c18cbd3e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetSystemInfo
GetCurrentProcessId
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
VirtualQuery
WriteProcessMemory
GetCurrentProcess
VirtualProtect
lstrcmpiA
LoadLibraryA
GetModuleHandleA
LoadLibraryExA
LoadLibraryExW
lstrlenA
WideCharToMultiByte
GlobalFree
SetFilePointer
CreateFileA
Sleep
WriteFile
ExpandEnvironmentStringsA
CreateThread
LoadLibraryW
GetProcAddress
wsprintfA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
CharUpperBuffA
ImageDirectoryEntryToData
__dllonexit
_adjust_fdiv
malloc
_initterm
free
memset
_memicmp
_onexit
_Prog_HookAllApps@8
fnDLL
fnFND
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ