?ALDLLProc@@YGJHIJ@Z
GetKeysPressed
ResetKeysPressed
SetHook
SetSavePath
UnHook
Static task
static1
Behavioral task
behavioral1
Sample
976a03ec3bd41de3b96360a1c054dfad.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
976a03ec3bd41de3b96360a1c054dfad.dll
Resource
win10v2004-20231222-en
Target
976a03ec3bd41de3b96360a1c054dfad
Size
182KB
MD5
976a03ec3bd41de3b96360a1c054dfad
SHA1
4ad1a31121f41bf51b55a2ef3a15e3cdafa0c341
SHA256
caa38744139cad2c7bae33ad3ea2bc4f592db1cdd1ad8c8df813f2443c34df3c
SHA512
5927f791f080dae999a667ca598d1cbbfadc6c2b807c2a8676bae8869cd8fb7b70c472dfe786326b56bce77c879de14332f21dfc5e77e7ea3c3e11c2d52a1c45
SSDEEP
3072:WFORac1//p1QgHRNyJmSxexyABg/zCWU943eS8IXKhMozhqE:Tkc/XQgHRNyJ/exx6mN9meS8IvoFt
Checks for missing Authenticode signature.
resource |
---|
976a03ec3bd41de3b96360a1c054dfad |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThread
SetHandleCount
GetSystemDirectoryA
SetEnvironmentVariableA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
GetTimeZoneInformation
GetLocaleInfoW
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
FatalAppExitA
IsBadWritePtr
IsBadReadPtr
HeapValidate
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
GetLastError
CloseHandle
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLocaleInfoA
HeapReAlloc
GetFileType
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
UnhandledExceptionFilter
HeapFree
VirtualAlloc
SetConsoleCtrlHandler
SetStdHandle
FlushFileBuffers
SetFilePointer
CreateFileA
ReadFile
GetStringTypeA
GetStringTypeW
SetEndOfFile
Sleep
IsValidLocale
IsValidCodePage
GetUserDefaultLCID
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
wsprintfA
GetKeyboardState
ToAscii
CallNextHookEx
?ALDLLProc@@YGJHIJ@Z
GetKeysPressed
ResetKeysPressed
SetHook
SetSavePath
UnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ