COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
879ab55056e69336f53600444ba476e5.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
879ab55056e69336f53600444ba476e5.dll
Resource
win10v2004-20231222-en
Target
879ab55056e69336f53600444ba476e5
Size
32KB
MD5
879ab55056e69336f53600444ba476e5
SHA1
c5d33f7ec5a9bcf99b8ea1b66b5417b8d03de1fb
SHA256
4a14ca61f4f18a92efac5f575a195d1bb73eda7a69a1d4bc9dd846c94e8c12d0
SHA512
8600b8bca11b9f054b99cd2cf54073321ac6568951e675924d546eb35d8ed5892953281b503c3002796516334c5bbf20a9f80d6b4885fa1940c00c763887b495
SSDEEP
768:AZ2I7fc/zqbCP7yvReKERlhCDglRbBWb4T:A0Iw/zqA7QReKED8klRbBWb4T
Checks for missing Authenticode signature.
resource |
---|
879ab55056e69336f53600444ba476e5 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
WaitForSingleObject
ReadFile
GetFileSize
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetFileAttributesA
GetCommandLineA
MultiByteToWideChar
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
GlobalAlloc
GetCurrentDirectoryA
DeleteFileA
GetModuleHandleA
Sleep
ExitProcess
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualProtect
GetDesktopWindow
GetClientRect
CallWindowProcA
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
GetDC
wsprintfA
ReleaseDC
EnumWindows
GetKeyboardState
MapVirtualKeyA
GetWindowTextA
ToAscii
GetParent
GetWindowThreadProcessId
GetWindowRect
CreateDCA
GetDeviceCaps
DeleteDC
GetObjectA
GetStockObject
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GdipDisposeImage
GdipLoadImageFromFile
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdipSaveImageToFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
inet_ntoa
WSAStartup
send
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
_access
strcat
strchr
atoi
strncpy
strstr
abs
malloc
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_getpid
_stricmp
_strlwr
_strrev
wcscmp
??2@YAPAXI@Z
__CxxFrameHandler
strtok
sprintf
strlen
strcmp
memset
strcpy
memcpy
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ