COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
7945af0a0df0c8f7b16ef050ed8f14e9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7945af0a0df0c8f7b16ef050ed8f14e9.dll
Resource
win10v2004-20231215-en
Target
7945af0a0df0c8f7b16ef050ed8f14e9
Size
32KB
MD5
7945af0a0df0c8f7b16ef050ed8f14e9
SHA1
dd3565d7b3b0b939036d830765a7a658ece7809a
SHA256
7df710457691384774941d1f564ee41c3fae391e03eea7ebd5d8fb92825ac7e4
SHA512
b444f46cf07740076bbf9755c041a7e6cf336d17b8ae796f606dc78568c7dff847829c49d338b9d1336442f5b72e6a9a5acbd7e733cfca18f456eaaf76bdcc20
SSDEEP
768:QZ2I7fc/zqbCP7yvVeiEZlhCDilRbBWbte:Q0Iw/zqA7QVeiEr8OlRbBWbte
Checks for missing Authenticode signature.
resource |
---|
7945af0a0df0c8f7b16ef050ed8f14e9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
WaitForSingleObject
ReadFile
GetFileSize
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetFileAttributesA
GetCommandLineA
MultiByteToWideChar
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
GlobalAlloc
GetCurrentDirectoryA
DeleteFileA
GetModuleHandleA
Sleep
ExitProcess
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualProtect
GetDesktopWindow
GetClientRect
CallWindowProcA
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
GetDC
wsprintfA
ReleaseDC
EnumWindows
GetKeyboardState
MapVirtualKeyA
GetWindowTextA
ToAscii
GetParent
GetWindowThreadProcessId
GetWindowRect
CreateDCA
GetDeviceCaps
DeleteDC
GetObjectA
GetStockObject
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GdipSaveImageToFile
GdipLoadImageFromFile
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdipDisposeImage
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
inet_ntoa
WSAStartup
send
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
_access
strcat
strchr
atoi
strncpy
strstr
abs
malloc
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_getpid
_stricmp
_strlwr
_strrev
wcscmp
??2@YAPAXI@Z
__CxxFrameHandler
strtok
sprintf
strlen
strcmp
memset
strcpy
memcpy
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ