EEGetModuleInterop
Static task
static1
Behavioral task
behavioral1
Sample
0c64fea725aa7dba7d5b6d208eff07f696de2143c8395aa67c44e7f1b7ae081b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c64fea725aa7dba7d5b6d208eff07f696de2143c8395aa67c44e7f1b7ae081b.dll
Resource
win10v2004-20221111-en
General
-
Target
0c64fea725aa7dba7d5b6d208eff07f696de2143c8395aa67c44e7f1b7ae081b
-
Size
176KB
-
MD5
410190cd36d91561503c49e9b3335b65
-
SHA1
eae8ed3126cf80755e4bade3a6ce0b456052d865
-
SHA256
0c64fea725aa7dba7d5b6d208eff07f696de2143c8395aa67c44e7f1b7ae081b
-
SHA512
1baa9b2898bbb182eaade9a1b20e2c6aad9975f84d982250108788508706261e8e3250699ae806c3de0f824dd44ad573853e52d8a767df33fa6788a4b0000413
-
SSDEEP
3072:QiZ2ETTGxb6TadkSDs2uz/F/Re0ERvhNyU4R9O3iUeIHRBPvMnFib:LlOZJdXsJ2RpNIRg3iU1HcnQb
Malware Config
Signatures
Files
-
0c64fea725aa7dba7d5b6d208eff07f696de2143c8395aa67c44e7f1b7ae081b.dll windows x86
5fe5ac9312eb2cf6521f4170de4d6d33
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strcmp
qsort
_snwprintf
memcpy
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
_except_handler3
acccore
ord111
ord132
ord131
xprt5
?SetCount@TPtrArray@XPRT@@QAE_NHH@Z
?GetDigestSize@TMdXDigest@XPRT@@UBEHXZ
??0TBstr@XPRT@@QAE@XZ
??0TMessageDigest@XPRT@@QAE@XZ
?Transform@TMd5Digest@XPRT@@EAEXQAIQBE@Z
?Update@TMessageDigest@XPRT@@QAEXPBEH@Z
xprt_memcpy
xprt_strlen
_XprtInitialize@8
_XprtUninitialize@0
?GetNextAssoc@TPtrFromPtrMap@XPRT@@QBEXAAPAU__POSITION@2@AAPAX1@Z
?GetStartPosition@TPtrFromPtrMap@XPRT@@QBEPAU__POSITION@2@XZ
_XprtMemRealloc@8
?SetAtGrow@TPtrArray@XPRT@@QAEXHPAX@Z
_XprtCreateThread@8
_XprtGetMilliseconds@0
_XprtDestroyThread@8
?FreeDataChain@SPlex@XPRT@@QAEXXZ
?Right@TBstr@XPRT@@QBE?AV12@H@Z
?Lock@TSpinLock@XPRT@@QAEXXZ
??ATPtrFromPtrMap@XPRT@@QAEAAPAXPAX@Z
?GetAt@TBstr@XPRT@@QBEGH@Z
?Mid@TBstr@XPRT@@QBE?AV12@HH@Z
?Mid@TBstr@XPRT@@QBE?AV12@H@Z
?IsEmpty@TBstr@XPRT@@QBE_NXZ
xprt_strcmp
?CompareNoCase@TBstr@XPRT@@QBEHPBG@Z
?Left@TBstr@XPRT@@QBE?AV12@H@Z
?Find@TBstr@XPRT@@QBEHGH@Z
?Attach@TBstr@XPRT@@QAEXPAG@Z
?Assign@TBstr@XPRT@@QAEAAV12@ABV12@@Z
??1TPtrFromPtrMap@XPRT@@QAE@XZ
?Add@TPtrArray@XPRT@@QAEHPAX@Z
??0TBstr@XPRT@@QAE@PBDPBG@Z
?Term@TCritSec@XPRT@@QAEXXZ
?Init@TCritSec@XPRT@@QAEXXZ
?Compare@TBstr@XPRT@@QBEHPBG@Z
??0TBstr@XPRT@@QAE@PBG@Z
??0TBstr@XPRT@@QAE@ABV01@@Z
?Append@TBstr@XPRT@@QAEAAV12@PBG@Z
??1TBstr@XPRT@@QAE@XZ
?Append@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
?Append@TBstr@XPRT@@QAEAAV12@ABV12@@Z
kSystemEncoding
?ToInt@TBstr@XPRT@@QBEHH@Z
kAsciiEncoding
?GetEncodedString@TBstr@XPRT@@QBEPBDPBG@Z
_XprtMemAlloc@4
_XprtAllocString@4
?Empty@TBstr@XPRT@@QAEXXZ
_XprtStringLen@4
?Assign@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
?Assign@TBstr@XPRT@@QAEAAV12@PBG@Z
?GetString@TBstr@XPRT@@QBEPBGXZ
xprt_iswdigit
?SetOptimalLoad@TPtrFromPtrMap@XPRT@@QAEXMMM_N@Z
xprt_memmove
?Unlock@TSpinLock@XPRT@@QAEXXZ
?Copy@TBstr@XPRT@@QBEPAGXZ
_XprtCanonicalizeScreenName@8
xprt_memset
?Append@TBstr@XPRT@@QAEAAV12@G@Z
?Normalize@TBstr@XPRT@@QAEAAV12@XZ
?RemoveAt@TPtrArray@XPRT@@QAEXHH@Z
??0TPtrArray@XPRT@@QAE@XZ
??1TPtrArray@XPRT@@QAE@XZ
?RemoveAll@TPtrFromPtrMap@XPRT@@QAEXXZ
_XprtMemFree@4
??0TPtrFromPtrMap@XPRT@@QAE@H@Z
?GetLength@TBstr@XPRT@@QBEHXZ
?GetBstrPtr@TBstr@XPRT@@QAEPAPAGXZ
xprt_snwprintf
?Find@TBstr@XPRT@@QBEHPBGH@Z
?Delete@TBstr@XPRT@@QAEHHH@Z
?GetRawBstrPtr@TBstr@XPRT@@QAEPAPAGXZ
_XprtAtomicDecrement@4
_XprtAtomicIncrement@4
?RemoveKey@TPtrFromPtrMap@XPRT@@QAE_NPAX@Z
?SetAt@TPtrFromPtrMap@XPRT@@QAEPAU__POSITION@2@PAX0@Z
?Lookup@TPtrFromPtrMap@XPRT@@QBE_NPAXAAPAX@Z
?Create@SPlex@XPRT@@SGPAU12@AAPAU12@II@Z
?Detach@TBstr@XPRT@@QAEPAGXZ
?Finish@TMdXDigest@XPRT@@UAEHPAEH@Z
coolcore46
_XpcsCreateSimpleInstance@12
_XpcsSafeArrayDestroy@4
_XpcsSafeArrayPutElement@12
_XpcsVarCopy@8
_XpcsSafeArrayUnlock@4
_XpcsSafeArrayLock@4
_XpcsVarChangeType@12
_XpcsSafeArrayGetElement@12
_XpcsSafeArrayGetUBound@12
_XpcsSafeArrayGetLBound@12
_XptlAdvise@16
_XptlUnadvise@12
_XpcsVarClear@4
_XptlInternalQueryInterface@16
_XptlComPtrAssign@8
kernel32
GetProcAddress
GetModuleHandleW
CloseHandle
SetEvent
ResetEvent
InterlockedCompareExchange
GetCurrentThreadId
ExitProcess
DisableThreadLibraryCalls
CreateEventW
user32
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjects
SetTimer
KillTimer
PeekMessageW
ole32
CoRegisterMessageFilter
CoUninitialize
CreateBindCtx
CoCreateInstance
CoInitializeEx
oleaut32
VariantChangeType
SafeArrayDestroy
VariantClear
SafeArrayRedim
SafeArrayPutElement
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayUnlock
SafeArrayCreate
SafeArrayLock
SafeArrayCopy
VariantInit
VariantCopy
SysAllocString
SysFreeString
Exports
Exports
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE