EEGetModuleInterop
Static task
static1
Behavioral task
behavioral1
Sample
c9be7b03ad26b77c40117cbe0984f91915a6bb4de5613fdb1b36e0395608ba88.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c9be7b03ad26b77c40117cbe0984f91915a6bb4de5613fdb1b36e0395608ba88.dll
Resource
win10v2004-20220812-en
General
-
Target
c9be7b03ad26b77c40117cbe0984f91915a6bb4de5613fdb1b36e0395608ba88
-
Size
328KB
-
MD5
62ac48c9d095f2d9a3e1fd8c34aeb62b
-
SHA1
a5ce5d0a452b072caaa03e9c14923aed5e2b218d
-
SHA256
c9be7b03ad26b77c40117cbe0984f91915a6bb4de5613fdb1b36e0395608ba88
-
SHA512
00b718d0be1b871e126fd7362882e2e2bb69636ab1027862991ca5ab1188906db8d19f4914f1f1612a5ee7705b4076197d8e4ca3612c3f98f888140d777a1e9d
-
SSDEEP
3072:diZ2ETTGxb6TadkSDs2uz/F/Re0NABrbfv8Xz1SFYFosfiPnyC8oCU:KlOZJdXsJkVbfUXZRB8nBjCU
Malware Config
Signatures
Files
-
c9be7b03ad26b77c40117cbe0984f91915a6bb4de5613fdb1b36e0395608ba88.dll windows x86
5fe5ac9312eb2cf6521f4170de4d6d33
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strcmp
qsort
_snwprintf
memcpy
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
_except_handler3
acccore
ord111
ord132
ord131
xprt5
?SetCount@TPtrArray@XPRT@@QAE_NHH@Z
?GetDigestSize@TMdXDigest@XPRT@@UBEHXZ
??0TBstr@XPRT@@QAE@XZ
??0TMessageDigest@XPRT@@QAE@XZ
?Transform@TMd5Digest@XPRT@@EAEXQAIQBE@Z
?Update@TMessageDigest@XPRT@@QAEXPBEH@Z
xprt_memcpy
xprt_strlen
_XprtInitialize@8
_XprtUninitialize@0
?GetNextAssoc@TPtrFromPtrMap@XPRT@@QBEXAAPAU__POSITION@2@AAPAX1@Z
?GetStartPosition@TPtrFromPtrMap@XPRT@@QBEPAU__POSITION@2@XZ
_XprtMemRealloc@8
?SetAtGrow@TPtrArray@XPRT@@QAEXHPAX@Z
_XprtCreateThread@8
_XprtGetMilliseconds@0
_XprtDestroyThread@8
?FreeDataChain@SPlex@XPRT@@QAEXXZ
?Right@TBstr@XPRT@@QBE?AV12@H@Z
?Lock@TSpinLock@XPRT@@QAEXXZ
??ATPtrFromPtrMap@XPRT@@QAEAAPAXPAX@Z
?GetAt@TBstr@XPRT@@QBEGH@Z
?Mid@TBstr@XPRT@@QBE?AV12@HH@Z
?Mid@TBstr@XPRT@@QBE?AV12@H@Z
?IsEmpty@TBstr@XPRT@@QBE_NXZ
xprt_strcmp
?CompareNoCase@TBstr@XPRT@@QBEHPBG@Z
?Left@TBstr@XPRT@@QBE?AV12@H@Z
?Find@TBstr@XPRT@@QBEHGH@Z
?Attach@TBstr@XPRT@@QAEXPAG@Z
?Assign@TBstr@XPRT@@QAEAAV12@ABV12@@Z
??1TPtrFromPtrMap@XPRT@@QAE@XZ
?Add@TPtrArray@XPRT@@QAEHPAX@Z
??0TBstr@XPRT@@QAE@PBDPBG@Z
?Term@TCritSec@XPRT@@QAEXXZ
?Init@TCritSec@XPRT@@QAEXXZ
?Compare@TBstr@XPRT@@QBEHPBG@Z
??0TBstr@XPRT@@QAE@PBG@Z
??0TBstr@XPRT@@QAE@ABV01@@Z
?Append@TBstr@XPRT@@QAEAAV12@PBG@Z
??1TBstr@XPRT@@QAE@XZ
?Append@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
?Append@TBstr@XPRT@@QAEAAV12@ABV12@@Z
kSystemEncoding
?ToInt@TBstr@XPRT@@QBEHH@Z
kAsciiEncoding
?GetEncodedString@TBstr@XPRT@@QBEPBDPBG@Z
_XprtMemAlloc@4
_XprtAllocString@4
?Empty@TBstr@XPRT@@QAEXXZ
_XprtStringLen@4
?Assign@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
?Assign@TBstr@XPRT@@QAEAAV12@PBG@Z
?GetString@TBstr@XPRT@@QBEPBGXZ
xprt_iswdigit
?SetOptimalLoad@TPtrFromPtrMap@XPRT@@QAEXMMM_N@Z
xprt_memmove
?Unlock@TSpinLock@XPRT@@QAEXXZ
?Copy@TBstr@XPRT@@QBEPAGXZ
_XprtCanonicalizeScreenName@8
xprt_memset
?Append@TBstr@XPRT@@QAEAAV12@G@Z
?Normalize@TBstr@XPRT@@QAEAAV12@XZ
?RemoveAt@TPtrArray@XPRT@@QAEXHH@Z
??0TPtrArray@XPRT@@QAE@XZ
??1TPtrArray@XPRT@@QAE@XZ
?RemoveAll@TPtrFromPtrMap@XPRT@@QAEXXZ
_XprtMemFree@4
??0TPtrFromPtrMap@XPRT@@QAE@H@Z
?GetLength@TBstr@XPRT@@QBEHXZ
?GetBstrPtr@TBstr@XPRT@@QAEPAPAGXZ
xprt_snwprintf
?Find@TBstr@XPRT@@QBEHPBGH@Z
?Delete@TBstr@XPRT@@QAEHHH@Z
?GetRawBstrPtr@TBstr@XPRT@@QAEPAPAGXZ
_XprtAtomicDecrement@4
_XprtAtomicIncrement@4
?RemoveKey@TPtrFromPtrMap@XPRT@@QAE_NPAX@Z
?SetAt@TPtrFromPtrMap@XPRT@@QAEPAU__POSITION@2@PAX0@Z
?Lookup@TPtrFromPtrMap@XPRT@@QBE_NPAXAAPAX@Z
?Create@SPlex@XPRT@@SGPAU12@AAPAU12@II@Z
?Detach@TBstr@XPRT@@QAEPAGXZ
?Finish@TMdXDigest@XPRT@@UAEHPAEH@Z
coolcore46
_XpcsCreateSimpleInstance@12
_XpcsSafeArrayDestroy@4
_XpcsSafeArrayPutElement@12
_XpcsVarCopy@8
_XpcsSafeArrayUnlock@4
_XpcsSafeArrayLock@4
_XpcsVarChangeType@12
_XpcsSafeArrayGetElement@12
_XpcsSafeArrayGetUBound@12
_XpcsSafeArrayGetLBound@12
_XptlAdvise@16
_XptlUnadvise@12
_XpcsVarClear@4
_XptlInternalQueryInterface@16
_XptlComPtrAssign@8
kernel32
GetProcAddress
GetModuleHandleW
CloseHandle
SetEvent
ResetEvent
InterlockedCompareExchange
GetCurrentThreadId
ExitProcess
DisableThreadLibraryCalls
CreateEventW
user32
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjects
SetTimer
KillTimer
PeekMessageW
ole32
CoRegisterMessageFilter
CoUninitialize
CreateBindCtx
CoCreateInstance
CoInitializeEx
oleaut32
VariantChangeType
SafeArrayDestroy
VariantClear
SafeArrayRedim
SafeArrayPutElement
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayUnlock
SafeArrayCreate
SafeArrayLock
SafeArrayCopy
VariantInit
VariantCopy
SysAllocString
SysFreeString
Exports
Exports
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE