set_create_window_hook
unset_create_window_hook
Static task
static1
Behavioral task
behavioral1
Sample
b6b358c536ed8be57096b2255400cdda.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6b358c536ed8be57096b2255400cdda.dll
Resource
win10v2004-20240226-en
Target
b6b358c536ed8be57096b2255400cdda
Size
44KB
MD5
b6b358c536ed8be57096b2255400cdda
SHA1
045941239e283ffcead02d09c168cb358e480e44
SHA256
bd235ca1f07cee2f4dcd1f4bf6a365ac84717e5343abf9b2cbec44ea7c04d7a8
SHA512
b165726311d1bf839de94f64188fcffeeb42f70dbdd8f9ab0d71ec02a20b9d5f5791a54ea947a4ac6b2084bc4269439c7f709e63a7e0a6a4727668bd383c1b84
SSDEEP
384:LhCso4fwku8gthqCqRKPK1aKQRLZSLOyXFUyNA6eic0GJp20shzhPAGwk3ef9ETu:dClauhqOp95yXJyJpwzGe1m
Checks for missing Authenticode signature.
resource |
---|
b6b358c536ed8be57096b2255400cdda |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReleaseMutex
GetLastError
CreateMutexA
SetLastError
CloseHandle
WaitForSingleObject
CreateEventA
SetEvent
GetVolumeInformationA
GetTempPathA
GetSystemDirectoryA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowLongA
??2@YAPAXI@Z
__CxxFrameHandler
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
_CxxThrowException
??1exception@@UAE@XZ
memmove
strlen
memcpy
memset
sprintf
strchr
strncpy
free
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
malloc
_adjust_fdiv
_splitpath
set_create_window_hook
unset_create_window_hook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE