DllInstall
DllRegisterServer
Behavioral task
behavioral1
Sample
5f77cbb8c78ee493ace6bd7d89882300a7e3f198f6401698cd4aab409e92a39d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f77cbb8c78ee493ace6bd7d89882300a7e3f198f6401698cd4aab409e92a39d.dll
Resource
win10v2004-20220812-en
Target
5f77cbb8c78ee493ace6bd7d89882300a7e3f198f6401698cd4aab409e92a39d.dll
Size
136KB
MD5
48f774a8d9a83a3e5b69a4b9509029e4
SHA1
8ad96089867a2b736a7863dbf796d290debd3614
SHA256
5f77cbb8c78ee493ace6bd7d89882300a7e3f198f6401698cd4aab409e92a39d
SHA512
19ac40ad08bf2027be64d90270db72a7c87d128aafac3f09965f29b486eb5c4c8b487bc0a6b2f29a30c5087e0f8f0e19c950e22268273f269ac1cf061d94242a
SSDEEP
3072:zKiWpv5+djKmTxXftoAOvJ11Hv8TBf9vY6B:zaEOmTxX1tOvJvHv8TBVQ6B
qakbot
78.94.148.92:1753
134.180.185.240:32987
201.136.101.182:38323
124.77.95.5:46163
196.90.29.190:30693
187.144.110.117:36330
10.44.33.140:65267
162.117.200.91:29984
159.254.223.192:31154
11.239.81.233:37
31.248.76.23:24072
224.77.182.18:55579
124.230.27.11:44408
205.255.39.94:54675
192.1.213.104:14212
145.3.120.239:20068
242.199.30.106:9157
243.240.195.106:42825
74.234.32.185:42698
102.51.5.67:47820
43.190.241.127:50708
29.119.168.182:51370
54.106.172.208:21101
76.55.174.209:2746
71.182.193.130:5327
111.143.132.167:9985
173.210.161.232:27188
22.155.219.162:29117
167.159.67.2:42455
80.214.112.151:9618
75.86.4.24:35165
106.146.239.56:49679
194.127.196.112:59762
64.184.233.29:48193
218.86.11.123:62100
108.87.254.103:36138
240.129.151.227:4400
96.117.66.72:0
48.220.224.248:32917
240.164.22.246:57048
224.87.85.180:40164
214.9.213.13:12523
117.180.92.184:46633
73.23.253.56:17393
162.74.55.118:4571
9.252.189.253:60714
101.200.152.191:46287
110.117.95.0:0
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memchr
_strtoi64
_errno
_snprintf
qsort
_vsnprintf
memset
_time64
_vsnwprintf
malloc
strncpy
strchr
strtod
localeconv
_ftol2_sse
free
atol
memcpy
FindNextFileW
GetTickCount
GetModuleHandleA
GetWindowsDirectoryW
GetCurrentDirectoryW
CreateMutexW
DuplicateHandle
GetCurrentThread
lstrcmpA
GetLastError
lstrcatA
CreateDirectoryW
DisconnectNamedPipe
lstrcpynW
GetProcessId
lstrcatW
lstrcpyW
GetOEMCP
GetFileAttributesW
lstrcmpiW
GetDriveTypeW
K32GetModuleFileNameExW
MoveFileW
lstrcpynA
lstrlenW
GetCurrentProcessId
SwitchToThread
GetModuleHandleW
GetProcAddress
HeapCreate
HeapFree
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
FreeLibrary
lstrcmpiA
GetSystemTimeAsFileTime
SetThreadPriority
GetExitCodeProcess
FindFirstFileW
GetSystemInfo
SetFileAttributesW
LocalAlloc
FlushFileBuffers
LoadLibraryW
GetCommandLineW
GetVersionExA
GetIconInfo
CopyIcon
GetDC
CharUpperBuffA
CharUpperBuffW
RegisterClassExA
UnregisterClassA
CreateWindowExA
DestroyWindow
DefWindowProcW
DrawIconEx
GetCursorInfo
SelectObject
GetObjectW
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
GetDIBits
GetDeviceCaps
DeleteDC
CommandLineToArgvW
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
VariantClear
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayGetLBound
DllInstall
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ