KBRegistwnd
KBSystemHook
UNKBSystemHook
Static task
static1
Behavioral task
behavioral1
Sample
e03db84d2ad97b5d4ee31c27142e7e0c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e03db84d2ad97b5d4ee31c27142e7e0c.dll
Resource
win10v2004-20231215-en
Target
e03db84d2ad97b5d4ee31c27142e7e0c
Size
32KB
MD5
e03db84d2ad97b5d4ee31c27142e7e0c
SHA1
834951856f51d965841ae6a7d6b06e340be25761
SHA256
7b87758be1b1b79b3598e0224af4820e9f076932481428f520fe826a1c2c3783
SHA512
4a98c6416dbc728970b0c176fc6d21b906d1ea111ccfc5ba9a0ddb83bf58119e239156824b7d7cedad846e8a5ce40558fc4a051e6579ffb6e7930c82853422cd
SSDEEP
384:bt9QnF7hTdxf73rHAmlYKRyxiBKMoIo9Bu:btyxhTdZbHHn8Io9Bu
Checks for missing Authenticode signature.
resource |
---|
e03db84d2ad97b5d4ee31c27142e7e0c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
GetEnvironmentStrings
GetTickCount
RtlUnwind
GetStringTypeW
GetStringTypeA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
LCMapStringW
HeapAlloc
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
UnhookWindowsHookEx
SendMessageA
CallNextHookEx
SetWindowsHookExA
KBRegistwnd
KBSystemHook
UNKBSystemHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ