x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
d45dccdf67804e390fdcdc3d7c0fd7f5b7e9946d1d56b1f4ea461c088e40bdca.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d45dccdf67804e390fdcdc3d7c0fd7f5b7e9946d1d56b1f4ea461c088e40bdca.dll
Resource
win10v2004-20220812-en
Target
d45dccdf67804e390fdcdc3d7c0fd7f5b7e9946d1d56b1f4ea461c088e40bdca
Size
28KB
MD5
f6c860d4605b340db5cf8fbe133193fb
SHA1
159fbd8e55d4f96a0c5d9ec3e94c2aeef2e944f9
SHA256
d45dccdf67804e390fdcdc3d7c0fd7f5b7e9946d1d56b1f4ea461c088e40bdca
SHA512
9ed6ac4c760565fdc4ab93e3d3e4075d0ffd62bd3dcf79eec8e7387e70b5ab30b733abc84eefd2195a4c31dfcee78978ce4720508ff7bd2bae756ef5b6d837c6
SSDEEP
768:IJEz4EXUKVkQzB9+TNxvhQufx76f/k7xxyYhPmQP25XCfdlJPTluR0bBuS3qo/p0:y9y2LwOCzJ24JKvcn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTempFileNameA
GetTempPathA
GetProcAddress
GetModuleHandleA
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
WaitForSingleObject
DeleteFileA
CreateEventA
lstrcmpA
HeapReAlloc
lstrcatA
GetModuleFileNameA
InterlockedExchange
RtlUnwind
HeapFree
GetProcessHeap
HeapAlloc
GetFileAttributesA
SetFileAttributesW
GetFileAttributesW
WinExec
lstrlenA
CreateProcessA
VirtualQuery
GetLastError
SetFileAttributesA
GlobalAlloc
lstrcpynA
lstrcpyA
SetFilePointer
GlobalFree
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
RegisterWindowMessageA
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
SetWindowLongA
CharLowerBuffA
ShowWindow
GetClientRect
GetWindowRect
CreateWindowExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetSetFilePointer
InternetCloseHandle
InternetOpenA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ