?HookInstaller@@YAXXZ
?HookUninstaller@@YAXXZ
StartServiceEx
StopServiceEx
_CallMsgProc@12
_CallWndProc@12
_ServiceRouteEx@12
Static task
static1
Behavioral task
behavioral1
Sample
d3490a2bb81044f6000de5c1e8fde583.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3490a2bb81044f6000de5c1e8fde583.dll
Resource
win10v2004-20240226-en
Target
d3490a2bb81044f6000de5c1e8fde583
Size
24KB
MD5
d3490a2bb81044f6000de5c1e8fde583
SHA1
0a7e8296c7a54c2b1e58eb489867d2e9bfaa553b
SHA256
4b67dfea66cf661534c56bd9d3f1a0c65141056cc081da9ac94ac88dcfb0c8e4
SHA512
8c916082269df3239b766ca91acf252eb3c8c28cded92a56ea9c3e73659f0e05765280b5e604bfbd8af5c607c506fa07f0f63bac927d662855d98661409f5a5f
SSDEEP
192:TMkBsIuuBBQ6PRQkXZGYBDB2lnlzdnpWoGj:TbsIuuBBQARQkpGEDQlzbWPj
Checks for missing Authenticode signature.
resource |
---|
d3490a2bb81044f6000de5c1e8fde583 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcatA
lstrlenA
ReadProcessMemory
GetCurrentDirectoryA
GetModuleFileNameA
CreateThread
GetClassNameA
EnumChildWindows
FindWindowExA
IsWindowVisible
IsWindow
wsprintfA
SendMessageA
KillTimer
LoadCursorA
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
DefWindowProcA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
SetTimer
GetStockObject
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
gethostname
memset
fread
strlen
fopen
fclose
strrchr
strcmp
_initterm
malloc
_adjust_fdiv
strcat
strcpy
free
_itoa
_strlwr
?HookInstaller@@YAXXZ
?HookUninstaller@@YAXXZ
StartServiceEx
StopServiceEx
_CallMsgProc@12
_CallWndProc@12
_ServiceRouteEx@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ