COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
2cf4aa3ee0c5888ae15d4d5709aff42d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cf4aa3ee0c5888ae15d4d5709aff42d.dll
Resource
win10v2004-20231215-en
Target
2cf4aa3ee0c5888ae15d4d5709aff42d
Size
32KB
MD5
2cf4aa3ee0c5888ae15d4d5709aff42d
SHA1
7b14639f6fbe37cebba9b60632d2135ad39d4a0a
SHA256
52c3fd76c624c8cb0df55bb11f66b47a0eada2c9fc313e7fd7872dbb23ed148f
SHA512
9e07652ee2fd8ccbec6a32d1b0e6b4732c47b42f09ed3ad5115878b846bafc2910bf11bee1bcf94d2877c03b29ad9119afb6118e19b4527574941b17a81370a1
SSDEEP
768:dUDjbYjOVw9bJm7XJJvsiHBBzhA/ERghu8:d8wOVwhA7XJJvNHBpisRIB
Checks for missing Authenticode signature.
resource |
---|
2cf4aa3ee0c5888ae15d4d5709aff42d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetFileSize
SetFileAttributesA
ExitProcess
GetCommandLineA
GetPrivateProfileStringA
GetCurrentDirectoryA
IsBadReadPtr
GetModuleHandleA
ReadFile
WaitForSingleObject
CreateThread
Sleep
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
RegisterWindowMessageA
wsprintfA
RegisterShellHookWindow
GetWindowThreadProcessId
EnumWindows
GetWindowTextA
GetClassNameA
CallWindowProcA
GetClientRect
GetParent
GetWindowRect
GetDC
GetDesktopWindow
ReleaseDC
SetWindowLongA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdipLoadImageFromFile
GdipSaveImageToFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
send
inet_ntoa
WSAStartup
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
_access
strrchr
strcat
memset
strchr
atoi
strcmp
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_strlwr
_strrev
_getpid
strncmp
strncpy
strstr
abs
sprintf
malloc
wcscmp
strcpy
strlen
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ