DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a27e019a9d2181888e65902b1ff25c90_dll32_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a27e019a9d2181888e65902b1ff25c90_dll32_JC.dll
Resource
win10v2004-20230915-en
Target
a27e019a9d2181888e65902b1ff25c90_dll32_JC.dll
Size
153KB
MD5
a27e019a9d2181888e65902b1ff25c90
SHA1
517da713940a1cf897f5d51689ee2e0f06b3344e
SHA256
fe5a30ed4f33552e97f660acb735fd0992af6fe27f0675027526e10b0cb8ed9c
SHA512
a44467aa808e0a2b616ef59478bf8319b61ecf9151ca8e93c5d2cddb0c1535bae9ddd464b7088f2645302057c7699d20a94350cd5e6a96f3a0a8e9ea380f24ea
SSDEEP
3072:odDiUnhjjvI4gC8q53BTWynC+kksF3O3qTjLx+A2b/UHu:eDiEjjCC8q5xTWyAtLf27b
Checks for missing Authenticode signature.
resource |
---|
a27e019a9d2181888e65902b1ff25c90_dll32_JC.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetLastError
GetModuleFileNameW
OutputDebugStringA
MultiByteToWideChar
GetCurrentThreadId
InterlockedIncrement
lstrlenW
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiA
LoadLibraryExA
DisableThreadLibraryCalls
GetModuleFileNameA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
Sleep
HeapSize
HeapReAlloc
FlushFileBuffers
CloseHandle
CreateFileA
GetLastError
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
GetVersion
RaiseException
GetFileAttributesW
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
LoadLibraryA
lstrlenA
WideCharToMultiByte
WriteConsoleW
InterlockedDecrement
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStdHandle
WriteFile
HeapDestroy
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualProtect
IsDebuggerPresent
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitProcess
DestroyMenu
DestroyWindow
SetWindowTextA
UnregisterClassA
GetWindowTextA
GetWindowTextLengthA
ShowWindow
GetDlgItem
CharNextW
CharNextA
LoadImageA
TrackPopupMenu
ReleaseDC
GetDC
LoadStringA
CreateWindowExA
GetClassInfoExA
RegisterClassExA
LoadCursorA
SetFocus
MapWindowPoints
MoveWindow
SetWindowPos
SetMenuItemBitmaps
AppendMenuA
CreatePopupMenu
GetWindow
GetFocus
TranslateMessage
DispatchMessageA
DefWindowProcA
GetWindowLongA
SetWindowLongA
CallWindowProcA
IsWindow
GetClientRect
SendMessageA
DeleteDC
GetObjectA
CreateFontIndirectA
SelectObject
GetStockObject
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryInfoKeyA
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
CoInitialize
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocStringLen
VariantClear
SysAllocString
VariantInit
VarBstrCmp
SysStringLen
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ