DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ba39a13f3f16f55162e93be6b8b0f18446be0ba0e21f75a122bec380d7f2d9a3.dll
Resource
win7-20221111-en
Target
ba39a13f3f16f55162e93be6b8b0f18446be0ba0e21f75a122bec380d7f2d9a3
Size
100KB
MD5
b37677c0190f32c65da80230b43ca465
SHA1
bf8102d01bc2cb40e199849f3bd8c9ac38a33882
SHA256
ba39a13f3f16f55162e93be6b8b0f18446be0ba0e21f75a122bec380d7f2d9a3
SHA512
54b2eca4dca3c23c77060045bf412ccbb5c6842825f2fea8a9c3a08977314ad2b5e6111a2769c8cbd07865578d7ff0ee018b5045f269c605719d72fecdbda760
SSDEEP
1536:OXUHaLSY+94LXOtcv23ygXEaRJQX4ydpnLfpOIkV:OX0A/+9kXOtcv23yg0aRJQTHLfpOIm
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
bind
listen
accept
send
select
recv
WSAStartup
gethostbyname
htons
connect
socket
closesocket
GetCurrentThreadId
MultiByteToWideChar
SetEvent
ReadFile
GetFileSize
CreateFileA
GetCurrentProcess
SetFileTime
WriteFile
MoveFileA
DeleteFileA
GetFileTime
Sleep
FindNextFileA
SetFilePointer
FindFirstFileA
GetModuleFileNameA
SetFileAttributesA
GetTempPathA
QueryPerformanceCounter
SetEndOfFile
CreateEventA
OpenEventA
GetLastError
lstrlenW
DisableThreadLibraryCalls
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
lstrlenA
lstrcmpA
InterlockedIncrement
lstrcpyA
GetProcAddress
LoadLibraryA
LocalFree
LocalAlloc
GetSystemDirectoryA
CloseHandle
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetCurrentProcessId
ExitThread
FreeLibrary
CreateThread
WideCharToMultiByte
GetTickCount
GetTempPathW
RaiseException
ResetEvent
WaitForSingleObject
GetModuleHandleA
lstrcatA
InterlockedDecrement
ExitWindowsEx
GetDC
ReleaseDC
FillRect
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DrawTextA
wsprintfA
DrawTextW
AttachThreadInput
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
GetCursorPos
ScreenToClient
RegisterWindowMessageA
SendMessageTimeoutA
CallNextHookEx
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
KillTimer
wsprintfW
EnumThreadWindows
IsWindowVisible
GetAncestor
GetSystemMetrics
SendMessageA
WindowFromPoint
GetClassNameA
GetForegroundWindow
CreateSolidBrush
CreateFontIndirectA
CreateCompatibleDC
SetTextColor
SetBkColor
CreateCompatibleBitmap
BitBlt
SelectObject
DeleteDC
DeleteObject
GetUserNameA
RegQueryValueExA
RegEnumValueA
IsTextUnicode
RegEnumKeyExA
RegOpenKeyExA
RegFlushKey
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
CoInitialize
CoUninitialize
CLSIDFromString
LoadRegTypeLi
SysStringLen
VariantCopy
VariantInit
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
ord23
ord58
ord30
ord32
ord57
ord18
ord15
ord31
ord21
ord16
free
atoi
wcscmp
rand
__CxxFrameHandler
sprintf
strstr
strncpy
strchr
_strupr
wcslen
isdigit
isalpha
??2@YAPAXI@Z
srand
strrchr
_purecall
_except_handler3
fclose
fread
fopen
fwrite
_EH_prolog
memcpy
strlen
strcpy
realloc
_mbsnbicmp
memmove
_mbsstr
_mbsnbcmp
_mbsicmp
fseek
_strnicmp
?terminate@@YAXXZ
malloc
strncat
??3@YAXPAX@Z
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
_CxxThrowException
time
_strlwr
_itoa
ftell
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ