CloseDataBase
CloseEngine
CloseTM
DeleteSentence2
DeleteSentence4
GetMatchSentence
GetMatchSentence2
GetMatchSentence4
GetSearchDataBaseInfo2
InitializeTM
OpenDataBase
SaveNewSentence2
SaveNewSentence4
SetCodePage
SetEngChiDLL
UpdateSentence2
Static task
static1
Behavioral task
behavioral1
Sample
0dc15c60d8d49c08efc9f411129b0f65f8fdf86e12d67659add103c850e4565d.dll
Resource
win7-20220901-en
Target
0dc15c60d8d49c08efc9f411129b0f65f8fdf86e12d67659add103c850e4565d
Size
248KB
MD5
80c8c0a2fe59a5adf0b169b9fe17a0c0
SHA1
0536574f033aacdc66d1e19acf1a05e4c92041bb
SHA256
0dc15c60d8d49c08efc9f411129b0f65f8fdf86e12d67659add103c850e4565d
SHA512
46b6953a731c249ced50cc031a67926d1ded3084de40de8774cfad5db920c8a0cd4331995cf9e8874125cacadf3cc4e1628063fa2a48861f499a27f527d41134
SSDEEP
6144:nxK+XEmPe10I07EFQGH/wPjb6BMiWzN4cw+a:xKDWhfmq54r
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCPInfo
GetOEMCP
FileTimeToLocalFileTime
FindNextFileA
RtlUnwind
GetCommandLineA
HeapAlloc
HeapFree
RaiseException
HeapSize
HeapReAlloc
ExitProcess
FileTimeToSystemTime
GetTimeZoneInformation
FindFirstFileA
SetErrorMode
FindClose
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetFilePointer
FlushFileBuffers
WriteFile
GetCurrentProcess
GetProcessVersion
GlobalFlags
LoadLibraryA
FreeLibrary
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpiA
GlobalAddAtomA
GetVersion
GlobalDeleteAtom
GetModuleHandleA
lstrcatA
GetModuleFileNameA
lstrcpyA
LocalReAlloc
TlsGetValue
MultiByteToWideChar
InterlockedDecrement
GlobalAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
GlobalReAlloc
GlobalLock
GlobalUnlock
WideCharToMultiByte
TlsFree
GlobalHandle
TlsAlloc
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
GetCurrentThreadId
lstrcpynA
CloseHandle
lstrcmpA
GetLastError
SetLastError
InterlockedIncrement
LocalFree
lstrlenA
GetStringTypeA
GetStringTypeW
TerminateProcess
GetACP
GetProcAddress
CoCreateInstance
OleRun
GetErrorInfo
VariantInit
VariantClear
VariantCopy
SysAllocString
SysFreeString
VariantChangeType
ord17
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
AdjustWindowRectEx
SetFocus
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
LoadStringA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
UnregisterClassA
UnhookWindowsHookEx
DispatchMessageA
SendMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetClientRect
GetDlgItem
CopyRect
GetSystemMetrics
GetWindowRect
GetWindow
SetBkColor
GetObjectA
SetTextColor
DeleteObject
DeleteDC
GetDeviceCaps
SaveDC
RestoreDC
GetStockObject
SelectObject
SetMapMode
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
CreateBitmap
GetClipBox
ScaleWindowExtEx
ClosePrinter
DocumentPropertiesA
OpenPrinterA
CloseDataBase
CloseEngine
CloseTM
DeleteSentence2
DeleteSentence4
GetMatchSentence
GetMatchSentence2
GetMatchSentence4
GetSearchDataBaseInfo2
InitializeTM
OpenDataBase
SaveNewSentence2
SaveNewSentence4
SetCodePage
SetEngChiDLL
UpdateSentence2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE