Init
User32SetWindowLongA
User32SetWindowLongW
Static task
static1
Behavioral task
behavioral1
Sample
fb983f858240a6f4b2b4023a0a030af39f4017f74c89390adac008dc326d1486.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb983f858240a6f4b2b4023a0a030af39f4017f74c89390adac008dc326d1486.dll
Resource
win10v2004-20240412-en
Target
fb983f858240a6f4b2b4023a0a030af39f4017f74c89390adac008dc326d1486
Size
10.5MB
MD5
4956e8a95e395410839361eaa94ee5d0
SHA1
1b1aba161c339f828e2cbf75ec0a56928a6d6c68
SHA256
fb983f858240a6f4b2b4023a0a030af39f4017f74c89390adac008dc326d1486
SHA512
e36ebfe492a77d137e9b7de285bceee66d198863da75a5a789e1a7a375ac5d8876c9920216a09423b2915d11ab17be230707eda5087fa20aff940ad9bda0f636
SSDEEP
6144:C0ThIZ5TBa2XxnEtH28R7vyTSfqNzC/IIXARLQf57nDm:C8IZn2HTvyTSUu/Iia
Checks for missing Authenticode signature.
resource |
---|
fb983f858240a6f4b2b4023a0a030af39f4017f74c89390adac008dc326d1486 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
MapViewOfFile
UnmapViewOfFile
FreeLibrary
GetCurrentProcess
QueryPerformanceCounter
GetTickCount
VirtualFree
Sleep
FlushInstructionCache
LoadLibraryA
GetCurrentThreadId
OpenFileMappingA
IsBadReadPtr
WaitForSingleObject
SetEvent
ExitThread
OpenMutexA
OpenEventA
QueryPerformanceFrequency
ReleaseMutex
VirtualQuery
CreateFileMappingA
VirtualProtect
CreateThread
GetSystemInfo
ReadConsoleW
ReadFile
SetStdHandle
GetStringTypeW
SetFilePointerEx
LCMapStringEx
lstrcpyA
GetModuleHandleW
TerminateProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
GetModuleFileNameA
GetStartupInfoW
InitOnceExecuteOnce
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
CreateFileW
GetProcessHeap
GetCurrentProcessId
CloseHandle
GetModuleHandleA
GetProcAddress
SetLastError
MultiByteToWideChar
lstrcatA
GetSystemDirectoryA
EncodePointer
DecodePointer
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
GetStdHandle
GetFileType
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
ExitProcess
HeapSize
WriteFile
IsProcessorFeaturePresent
IsDebuggerPresent
GetForegroundWindow
CopyIcon
TranslateAcceleratorA
GetWindow
ScreenToClient
IsIconic
EnumWindows
GetWindowPlacement
GetWindowTextA
GetKeyState
GetFocus
SetCursorPos
GetCursorPos
GetActiveWindow
SystemParametersInfoA
ClientToScreen
GetWindowRect
GetWindowLongPtrA
CallNextHookEx
GetWindowLongPtrW
GetClientRect
SetFocus
SendMessageA
GetClassLongPtrA
GetIconInfo
TranslateMessage
GetAsyncKeyState
MapVirtualKeyA
GetClassLongPtrW
IsWindowUnicode
DefWindowProcA
DestroyCursor
SendMessageTimeoutA
SetWindowLongPtrA
PostMessageA
ReleaseCapture
SetWindowLongPtrW
CallWindowProcA
GetMessageTime
GetWindowThreadProcessId
GetParent
DrawIcon
GetDC
ReleaseDC
IsWindow
WindowFromPoint
DeleteObject
DeleteDC
GetDIBits
SetBkColor
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
ExtTextOutA
Init
User32SetWindowLongA
User32SetWindowLongW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ