CTCleanup
CTGetVersion
CTInit
Static task
static1
Behavioral task
behavioral1
Sample
ee0e2aa26f0f149e9cb868a9ab0c3fcff75da1626f8c5553e688f323b7739cbc.dll
Resource
win7-20220812-en
Target
ee0e2aa26f0f149e9cb868a9ab0c3fcff75da1626f8c5553e688f323b7739cbc
Size
2.4MB
MD5
0a942882a0b25c5df7da5482845d08e1
SHA1
7024dc7d5d08e5df4ef508254ab377037669cd0f
SHA256
ee0e2aa26f0f149e9cb868a9ab0c3fcff75da1626f8c5553e688f323b7739cbc
SHA512
d2c54dbe8fbebc712778652581d2bce2cab9eeec57fc0c400240f77d97b3ae3001cc9e1866597e063e6a2ffef5b62eefe0213e964f69d04d9f38c2d465745c77
SSDEEP
49152:GU3U+ZYmxjpv7x4GFM/+b8dTMNh9Wr73h7NXSWEqNJO5hYTVMCRisKE82:GiU2YmxjpDx4Zo8dYNh9q73h7NXYkRiO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
InterlockedIncrement
FileTimeToSystemTime
FileTimeToLocalFileTime
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
WriteFile
FlushFileBuffers
IsProcessorFeaturePresent
GetSystemInfo
GetTimeZoneInformation
CompareStringA
GetACP
GetWindowsDirectoryA
GetSystemDirectoryA
InterlockedExchange
GetCurrentProcess
ReadProcessMemory
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetLastError
GetSystemTime
SystemTimeToFileTime
GetVersionExA
GetSystemDefaultLCID
GetModuleHandleA
SetLastError
FreeLibrary
LoadLibraryA
WaitForMultipleObjects
FindNextChangeNotification
FindCloseChangeNotification
GetTickCount
FindClose
lstrlenA
CreateFileA
lstrcmpiA
GetPrivateProfileStringA
GetFileSize
SetFilePointer
ReadFile
GetModuleFileNameA
CloseHandle
InterlockedCompareExchange
Sleep
GetCurrentThread
GetThreadSelectorEntry
DestroyWindow
GetDesktopWindow
RegisterClassA
DefWindowProcA
MessageBoxA
wsprintfA
ReleaseDC
GetDC
CreateWindowExA
SetTextAlign
SetBkMode
PatBlt
GetBitmapBits
ExtTextOutA
GetTextExtentPointA
GetCharABCWidthsA
GetTextMetricsA
SetTextColor
SetBkColor
CreateBitmap
CreateCompatibleDC
DeleteDC
SelectObject
GetFontData
DeleteObject
GetDeviceCaps
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
SHGetSpecialFolderLocation
SHGetMalloc
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?_Xlen@_String_base@std@@SAXXZ
?_Xran@_String_base@std@@SAXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
_CxxThrowException
memcpy
strlen
memset
_setjmp3
labs
memmove
abort
fprintf
__iob_func
longjmp
__CxxFrameHandler3
memcmp
strncmp
strcmp
atol
strtol
atoi
strtoul
strncpy
strchr
strcpy
_purecall
atan
__RTDynamicCast
sprintf
wcslen
wcscat
sqrt
wcscmp
strstr
wcsstr
ceil
floor
wcsrchr
towupper
wcsncmp
wcsncpy
qsort
sscanf
_vswprintf
_time64
rand
srand
_wsplitpath
_wfullpath
wcschr
exit
_waccess
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@XZ
bsearch
isdigit
_invalid_parameter_noinfo
memmove_s
asin
realloc
isxdigit
isalnum
memcpy_s
isalpha
strcat
strtok
strrchr
isspace
_errno
__CxxLongjmpUnwind
strncat
tan
strpbrk
??0exception@std@@QAE@ABQBDH@Z
fabs
vsprintf
strtod
printf
_localtime64
wcstok
strspn
strcspn
_gmtime64
_mktime64
clearerr
ferror
feof
fread
fwrite
fputs
fgets
ftell
fseek
fflush
fclose
_get_osfhandle
_fileno
_open_osfhandle
isupper
toupper
tolower
wcsncat
fopen
rewind
fputc
fgetc
ungetc
remove
modf
fmod
pow
log
_tzset
__timezone
getenv
__tzname
_stricmp
__CxxFrameHandler
_unlock
_encode_pointer
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_malloc_crt
_encoded_null
free
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
__clean_type_info_names_internal
_wcsnicmp
_wcsicmp
wcscpy
_fdopen
CTCleanup
CTGetVersion
CTInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE