COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
75ef4094deb58ef54d3bdeb5a19fe77a.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
75ef4094deb58ef54d3bdeb5a19fe77a.dll
Resource
win10v2004-20231215-en
Target
75ef4094deb58ef54d3bdeb5a19fe77a
Size
32KB
MD5
75ef4094deb58ef54d3bdeb5a19fe77a
SHA1
7c181994681e0ba1498a8467e1b313ae34a1f6d3
SHA256
29a6070c7a7d189c8e2f90cbee9f874f6128cd8546ecd674ff62fd65034f9ebf
SHA512
bb9d841ac80bf88a322172c96ba74964d45ce41467b107e1ef5dc8c823dce164047cb5abb17d962f703876b169d16c26e5072e17c4d03bb71e8988284122a6f6
SSDEEP
768:+UDjbYjOVw9bJm7XJJvsiHBBzhA/ERghu8:+8wOVwhA7XJJvNHBpisRIB
Checks for missing Authenticode signature.
resource |
---|
75ef4094deb58ef54d3bdeb5a19fe77a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetFileSize
SetFileAttributesA
ExitProcess
GetCommandLineA
GetPrivateProfileStringA
GetCurrentDirectoryA
IsBadReadPtr
GetModuleHandleA
ReadFile
WaitForSingleObject
CreateThread
Sleep
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
RegisterWindowMessageA
wsprintfA
RegisterShellHookWindow
GetWindowThreadProcessId
EnumWindows
GetWindowTextA
GetClassNameA
CallWindowProcA
GetClientRect
GetParent
GetWindowRect
GetDC
GetDesktopWindow
ReleaseDC
SetWindowLongA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdipLoadImageFromFile
GdipSaveImageToFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
send
inet_ntoa
WSAStartup
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
_access
strrchr
strcat
memset
strchr
atoi
strcmp
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_strlwr
_strrev
_getpid
strncmp
strncpy
strstr
abs
sprintf
malloc
wcscmp
strcpy
strlen
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ