SetHook
UnSetHook
Static task
static1
Behavioral task
behavioral1
Sample
c435ad8d9ea1492149c6cd4921d92153.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c435ad8d9ea1492149c6cd4921d92153.dll
Resource
win10v2004-20240226-en
Target
c435ad8d9ea1492149c6cd4921d92153
Size
11KB
MD5
c435ad8d9ea1492149c6cd4921d92153
SHA1
c92536ee686f9c76bad2a724f57c7369a4c26cb6
SHA256
7b9e034ad01df9b4d11e611a41c0ce834a22fbb2fdea02ccab73d007136823a4
SHA512
3df71cbb19c6ac4fb9ce89197fc79119f0b9378618fa6f09e5af3bba4db7026da735454da8a9707fb0d9676c9e083771b4b5def70b099ae4aa7943511e87b807
SSDEEP
192:gHZBb4IvcMF2hhu8GVsPOGDSnfgEaziv7xTpsOpIbR6k:gHUIvcMF2LbLPOGenYEaWVSOYR6
Checks for missing Authenticode signature.
resource |
---|
c435ad8d9ea1492149c6cd4921d92153 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAddAtomA
GlobalDeleteAtom
GetModuleHandleA
GetModuleFileNameA
PostMessageA
EnumWindows
GetCursor
UnhookWindowsHookEx
RegisterWindowMessageA
CallNextHookEx
SetPropA
GetPropA
GetClientRect
SetWindowsHookExA
IsWindowVisible
GetUpdateRgn
ClientToScreen
MessageBoxA
GetWindowRect
RemovePropA
DeleteObject
CreateRectRgn
GetRegionData
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
_initterm
malloc
_adjust_fdiv
_strdup
sprintf
free
??2@YAPAXI@Z
??3@YAXPAX@Z
SetHook
UnSetHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ