InstallHook
UninstallHook
Static task
static1
Behavioral task
behavioral1
Sample
a32df3dc56888562f27417c7e2ad4584.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a32df3dc56888562f27417c7e2ad4584.dll
Resource
win10v2004-20240221-en
Target
a32df3dc56888562f27417c7e2ad4584
Size
96KB
MD5
a32df3dc56888562f27417c7e2ad4584
SHA1
d71ba56564082ad79be1b3e82cfc7745d06f19d7
SHA256
4a239d8b633fb98feb8312ed9367460fc5384a1f80737f991d2a9c6e94efe5c3
SHA512
1a0c2d0235cfa2f814a434080eb1c980a962ef1f8b7dba70f14c9bbf8ae4599040695ac602a9ac7120619df3047c040f5c73fedcbf24119879b60ebe595cd0a1
SSDEEP
1536:NPVlp9XonLSTkYobQaRgXOWjPBA1euND5WQeWBJna8b:TQLS6EaRgXOWjPSnNFWQhBo8
Checks for missing Authenticode signature.
resource |
---|
a32df3dc56888562f27417c7e2ad4584 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord1253
ord537
ord6663
ord800
ord1182
ord823
ord342
ord539
swprintf
_except_handler3
__CxxFrameHandler
free
_initterm
malloc
_adjust_fdiv
memcpy
wcscpy
GetModuleFileNameW
GetCurrentProcess
FlushInstructionCache
VirtualProtect
SetLastError
GetFileAttributesA
GetFileAttributesW
GetProcessId
MultiByteToWideChar
GetSystemDirectoryW
GetCurrentProcessId
OutputDebugStringW
CreateFileA
CreateFileW
OpenProcess
WinExec
CreateProcessA
CreateProcessW
CopyFileW
CopyFileA
CreateRemoteThread
SetWindowsHookExA
CallNextHookEx
FindWindowExA
SendMessageA
UnhookWindowsHookEx
InstallHook
UninstallHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ