COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
10e96f6e2b69a40eea9d966546aa0b58.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10e96f6e2b69a40eea9d966546aa0b58.dll
Resource
win10v2004-20231215-en
Target
10e96f6e2b69a40eea9d966546aa0b58
Size
32KB
MD5
10e96f6e2b69a40eea9d966546aa0b58
SHA1
6fa6855d260a68f3e5c22bf162aa23a786cdde58
SHA256
d88ba8906be70ed2f61147c9133fc3d1448c5f36b7d61f200b94388856b2fa0b
SHA512
3bdd82909661281eaa4373a5b00e90820fe315235083b207377082756f72d5e4c7d34246e389d31878e8b0220ce2ef851c3789f0b13724625d67e1465050bc7d
SSDEEP
768:sZ2I7fc/zqbCP7yvVeiEZlhCDilRbBWbte:s0Iw/zqA7QVeiEr8OlRbBWbte
Checks for missing Authenticode signature.
resource |
---|
10e96f6e2b69a40eea9d966546aa0b58 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
WaitForSingleObject
ReadFile
GetFileSize
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetFileAttributesA
GetCommandLineA
MultiByteToWideChar
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
GlobalAlloc
GetCurrentDirectoryA
DeleteFileA
GetModuleHandleA
Sleep
ExitProcess
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualProtect
GetDesktopWindow
GetClientRect
CallWindowProcA
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
GetDC
wsprintfA
ReleaseDC
EnumWindows
GetKeyboardState
MapVirtualKeyA
GetWindowTextA
ToAscii
GetParent
GetWindowThreadProcessId
GetWindowRect
CreateDCA
GetDeviceCaps
DeleteDC
GetObjectA
GetStockObject
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GdipSaveImageToFile
GdipLoadImageFromFile
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdipDisposeImage
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
inet_ntoa
WSAStartup
send
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
_access
strcat
strchr
atoi
strncpy
strstr
abs
malloc
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_getpid
_stricmp
_strlwr
_strrev
wcscmp
??2@YAPAXI@Z
__CxxFrameHandler
strtok
sprintf
strlen
strcmp
memset
strcpy
memcpy
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ