StartHook
StopHook
Static task
static1
Behavioral task
behavioral1
Sample
66e6b0d7ae1fdece58b2cf743c51fa60_dll32_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
66e6b0d7ae1fdece58b2cf743c51fa60_dll32_JC.dll
Resource
win10v2004-20230915-en
Target
66e6b0d7ae1fdece58b2cf743c51fa60_dll32_JC.dll
Size
244KB
MD5
66e6b0d7ae1fdece58b2cf743c51fa60
SHA1
aa79884b786dbf553fd282c9d9649a4469ae75af
SHA256
95016e7ccba15d01f151710109727dfabe986047197c4a87d366f43bf62164ba
SHA512
475537857c08026118fc5e094252906a730411eb220c4c4055b7dd00d7a5e526af6c69774f7844a31c0124238a7e40fc6eb4859c6b21e6d57f2460c2ac0cae6c
SSDEEP
3072:GL6OC29H+irJq+oIQ/gYCwdWeyV6LKzWaS6K6jh0tS/Dp+7hPqr/VcC8X/8IUwsw:0qsYDd1L4pieEDXLpQ+x/xnj/UVjdH
Checks for missing Authenticode signature.
resource |
---|
66e6b0d7ae1fdece58b2cf743c51fa60_dll32_JC.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThreadId
GetTempPathW
ReadFile
WriteFile
SetFileAttributesW
GetFileAttributesW
Sleep
SetFilePointer
LeaveCriticalSection
EnterCriticalSection
DeleteFileW
GetSystemDirectoryW
GetWindowsDirectoryW
InitializeCriticalSection
OutputDebugStringA
VirtualAlloc
VirtualFree
OpenMutexA
MulDiv
WriteProcessMemory
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CreateMutexA
GetModuleFileNameA
CreateFileW
CopyFileW
MoveFileExW
OutputDebugStringW
CreateDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
FindClose
FindFirstFileA
FindFirstFileW
GetTempPathA
GetFileAttributesA
GetTickCount
GetSystemTime
GetEnvironmentVariableA
VirtualAllocEx
GetShortPathNameW
GetPrivateProfileStringA
CreateProcessW
VirtualProtectEx
CreateProcessA
ResumeThread
ReadProcessMemory
VirtualQueryEx
InterlockedExchange
SetEndOfFile
GetOEMCP
GetACP
FlushFileBuffers
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
RaiseException
IsBadWritePtr
HeapCreate
HeapDestroy
GetVersionExA
GetStartupInfoA
GetFileSize
SetFileTime
GetFileTime
QueryDosDeviceW
GetModuleHandleA
GetCurrentProcess
VirtualProtect
FlushInstructionCache
CreateThread
GetLastError
SetLastError
MultiByteToWideChar
WideCharToMultiByte
GlobalFree
GlobalFlags
CloseHandle
FreeLibrary
GetCurrentProcessId
OpenProcess
LoadLibraryA
GetProcAddress
GetStdHandle
SetHandleCount
GetFileType
SetStdHandle
LCMapStringW
LCMapStringA
DeleteCriticalSection
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
HeapSize
GetVersion
GetCommandLineA
HeapReAlloc
HeapFree
HeapAlloc
ExitProcess
InterlockedIncrement
InterlockedDecrement
RtlUnwind
DrawTextA
SendMessageA
MessageBoxA
WindowFromPoint
GetCursorPos
WindowFromDC
GetSystemMetrics
GetWindowThreadProcessId
MessageBoxW
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
OpenClipboard
EmptyClipboard
CloseClipboard
PeekMessageA
TranslateMessage
DispatchMessageA
GetDesktopWindow
CreateFontA
SelectObject
SetTextAlign
TextOutA
DeleteObject
GetStockObject
SetBkColor
SetTextColor
SetBkMode
GetDeviceCaps
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetSpecialFolderPathA
ProgIDFromCLSID
CoTaskMemFree
DoDragDrop
__WSAFDIsSet
WSAGetLastError
select
closesocket
htons
gethostbyname
inet_addr
socket
recv
send
getsockopt
ntohs
inet_ntoa
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
EnumProcessModules
GetModuleFileNameExA
StartHook
StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ