?duier@@YAHXZ
?glopiq@@YAHXZ
?jpqdr@@YAHXZ
DllRegisterServer
PluginInit
Static task
static1
Behavioral task
behavioral1
Sample
b8bafa2b1ba6c39a52fd748636be465f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8bafa2b1ba6c39a52fd748636be465f.dll
Resource
win10v2004-20240226-en
Target
b8bafa2b1ba6c39a52fd748636be465f
Size
294KB
MD5
b8bafa2b1ba6c39a52fd748636be465f
SHA1
d90ada82bfdf81d30eed9b1d4102acaed345c907
SHA256
1ba3dae484f0f97e600a5bfeddd6cac41b17b717a0e776c34622450d8372d5a5
SHA512
4cc124d9630cca5d27d15ab113bc93eb4b9625a7ab0de1f8a1d6923797cb4309a89d04804e8f0bfd514479700e07545a509f1b3114807b9cb77c3e57c92829ba
SSDEEP
3072:7nm/lcz0nUFsV9MZ/5Mdjr85R78dnrD6KM69pzy3nJVV0GS4NXfXyWDotUKr3:Tz0nUFsV6Z/2ZwR7chpCJV/iSar3
Checks for missing Authenticode signature.
Processes:
resource |
---|
b8bafa2b1ba6c39a52fd748636be465f |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
StrStrA
GetCurrentThreadId
VirtualAlloc
GetProcAddress
LoadLibraryA
GetCurrentProcessId
VirtualFree
GetClientRect
?duier@@YAHXZ
?glopiq@@YAHXZ
?jpqdr@@YAHXZ
DllRegisterServer
PluginInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ