?duier@@YAHXZ
?glopiq@@YAHXZ
?jpqdr@@YAHXZ
DllRegisterServer
PluginInit
Static task
static1
Behavioral task
behavioral1
Sample
d6e4febd633072906a372964f1edfc3e.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
d6e4febd633072906a372964f1edfc3e.dll
Resource
win10v2004-20240226-en
Target
d6e4febd633072906a372964f1edfc3e
Size
294KB
MD5
d6e4febd633072906a372964f1edfc3e
SHA1
97b0c16c9a198606999c2738260298e8115cf030
SHA256
dbb9aed0ff425ff5c162cb0518565878ca08e2a58f059bcf47a15da6d560a63b
SHA512
7b4b3a512cb13efea4274b2c77bd207ba5a5d59895c9cc027a86dfb4e3bb6eebc5eea9f5f5a56c65570d922d41f9410c041a03df3e2323e75703a7a1f186a528
SSDEEP
3072:7nm/lcz0nUFsV9MZ/5Mdjr85R78dnrD6KM69pzy3nJVV0GS4NXfXyWDotUKrK:Tz0nUFsV6Z/2ZwR7chpCJV/iSarK
Checks for missing Authenticode signature.
Processes:
resource |
---|
d6e4febd633072906a372964f1edfc3e |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
StrStrA
GetCurrentThreadId
VirtualAlloc
GetProcAddress
LoadLibraryA
GetCurrentProcessId
VirtualFree
GetClientRect
?duier@@YAHXZ
?glopiq@@YAHXZ
?jpqdr@@YAHXZ
DllRegisterServer
PluginInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ