AlphaBlend
DllInitialize
DriverProc
GradientFill
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
TransparentBlt
modMessage
modmCallback
vSetDdrawflag
Static task
static1
Behavioral task
behavioral1
Sample
74f8776337501d924f4220f9e34cd1a8.dll
Resource
win7-20231215-en
Target
74f8776337501d924f4220f9e34cd1a8
Size
32KB
MD5
74f8776337501d924f4220f9e34cd1a8
SHA1
1fdb368b29cad97fe10d71d371f2c1d441a7f232
SHA256
8f90cff2ee63c14727696a752228950955999d29da546f9954531908c8cfa5f6
SHA512
e2aeed83ec633cdee8e8a9086d65ac8cfd37352472b3dbb56a0b4315783368db4c3864475d1314dec51c5eda6c7921f641ea1c7ad86c5e656ac7c7eeffab367b
SSDEEP
768:jUTHaQ5CPZ5mvC87Gt6ZWpNqOjsSRzVs+:jUTHb5i5mH7GtEDQRxJ
Checks for missing Authenticode signature.
Processes:
resource |
---|
74f8776337501d924f4220f9e34cd1a8 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
WaitForSingleObject
ReadFile
GetFileSize
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetFileAttributesA
GetCommandLineA
CreateMutexA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
Sleep
ExitProcess
IsBadReadPtr
GetParent
GetWindowThreadProcessId
EnumWindows
wsprintfA
GetWindowTextA
ReleaseDC
GetWindowRect
GetDC
GetDesktopWindow
GetClientRect
CallWindowProcA
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdipCloneImage
GdipAlloc
GdipFree
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdipSaveImageToFile
GdiplusShutdown
GdipLoadImageFromFile
GdipDisposeImage
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
inet_ntoa
send
recv
socket
inet_addr
htons
connect
closesocket
gethostbyname
WSACleanup
WSAStartup
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
InternetOpenA
_access
strrchr
strchr
strstr
abs
malloc
free
_onexit
_initterm
_adjust_fdiv
_strrev
_getpid
_stricmp
_strlwr
__dllonexit
wcscmp
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
strncpy
atoi
strcmp
memset
strcat
strcpy
strlen
sprintf
Netbios
AlphaBlend
DllInitialize
DriverProc
GradientFill
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
TransparentBlt
modMessage
modmCallback
vSetDdrawflag
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ