DeleteSelf
Hookoff
Hookon
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
Behavioral task
behavioral1
Sample
580b6b45a83449e686d0d9d29d84f961.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
580b6b45a83449e686d0d9d29d84f961.dll
Resource
win10v2004-20231215-en
Target
580b6b45a83449e686d0d9d29d84f961
Size
55KB
MD5
580b6b45a83449e686d0d9d29d84f961
SHA1
0095d1e693b71f9e2aa6abe2e14f062084f7b4ca
SHA256
cb899cefc892f15539bb8f15871045a863135e80c0418db680e49fa7b35588c3
SHA512
b8af4b2eb58611b07ef6adc3e903ee77a032c2753a43d84a38064571a75b08d27b162706b1c527c76538c183d52686de2b70566cf268507a9852b638d6ffef80
SSDEEP
1536:cxrMmTISZhsmGE1rBZ6FqQnRCiNFb/yKnvGrH:cx3TXRGSZ6FqQRCAFzyKnvm
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
580b6b45a83449e686d0d9d29d84f961 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
WritePrivateProfileStringA
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetCurrentThreadId
SetFilePointer
GetModuleFileNameA
IsBadReadPtr
TerminateProcess
OpenProcess
CopyFileA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
GetPrivateProfileStringA
VirtualAlloc
GetModuleHandleA
CreateToolhelp32Snapshot
Process32First
Process32Next
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MultiByteToWideChar
DeleteFileA
ReadFile
GetTickCount
lstrcmpiA
lstrcmpA
WinExec
GetCurrentProcess
ExitProcess
Sleep
lstrlenA
lstrcpynA
CreateFileA
WriteFile
CloseHandle
lstrcpyA
GetTempPathA
lstrcatA
VirtualProtect
Module32First
OutputDebugStringA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetClassNameA
GetForegroundWindow
EnumWindows
GetSystemMetrics
IsWindowVisible
IsIconic
GetActiveWindow
ShowWindow
SetForegroundWindow
GetWindowInfo
PrintWindow
FindWindowA
PostThreadMessageA
GetWindowThreadProcessId
IsRectEmpty
ReleaseDC
LoadImageA
GetDC
ShowScrollBar
EndDialog
GetWindowTextA
SendMessageA
GetDlgItem
SetLayeredWindowAttributes
SetWindowLongA
GetWindowLongA
GetCursorPos
ExitWindowsEx
DialogBoxParamA
FindWindowExA
CreateCompatibleBitmap
DeleteObject
SelectPalette
CreateDCA
GetDeviceCaps
DeleteDC
StretchBlt
GetObjectA
SelectObject
CreateCompatibleDC
GetStockObject
SetTextColor
SetBkColor
GetDIBits
RealizePalette
BitBlt
CryptAcquireContextA
CryptCreateHash
CryptHashData
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
HttpAddRequestHeadersA
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCheckConnectionA
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
InternetQueryDataAvailable
inet_ntoa
gethostbyname
GdipCloneImage
GdipDisposeImage
GdipFree
GdiplusStartup
GdipAlloc
GdipLoadImageFromFile
GdipSaveImageToFile
GdiplusShutdown
GdipGetImageEncodersSize
GdipGetImageEncoders
Netbios
atoi
strstr
free
malloc
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
memmove
strrchr
strchr
sscanf
sprintf
DeleteSelf
Hookoff
Hookon
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ