x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
d3bdb7f95f8a28e8927902863ded6a983991846ca40ee0add295610dcf2050ab.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d3bdb7f95f8a28e8927902863ded6a983991846ca40ee0add295610dcf2050ab.dll
Resource
win10v2004-20220812-en
Target
d3bdb7f95f8a28e8927902863ded6a983991846ca40ee0add295610dcf2050ab
Size
33KB
MD5
0f3d8d7d83c5e6fa35177eac149b0cd7
SHA1
be89d11df9f1dfa8940587eaff0a8e643501ceb2
SHA256
d3bdb7f95f8a28e8927902863ded6a983991846ca40ee0add295610dcf2050ab
SHA512
3948941a00316b55bce3ddc9b22a56223fc1d44d9e95d00942130a26ac321d98e2d942778555216438c054042c8951838287702bfb322e69228fe0e7443a4076
SSDEEP
384:IKAyHewtXpOkpKsDoIkvrY+xCJMA6FS5IykMDqz:/Zt0k5kv0gCJMD8fkM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcessHeap
HeapFree
HeapReAlloc
GetTempFileNameA
GetTempPathA
GetProcAddress
GetModuleHandleA
lstrcatA
MulDiv
GetTickCount
CloseHandle
ReadFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
HeapAlloc
SetFilePointer
GetModuleFileNameA
InterlockedExchange
RtlUnwind
FindNextFileW
GetModuleHandleW
PulseEvent
OpenEventA
WriteFile
ResetEvent
GetCommandLineW
lstrlenA
CreateProcessA
VirtualQuery
GetLastError
GlobalAlloc
lstrcpynA
lstrcpyA
CreateEventA
GlobalFree
ShowWindowAsync
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
RegisterWindowMessageA
SetWindowLongA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
ShowWindow
SetDlgItemTextA
CharLowerBuffA
GetClientRect
GetWindowRect
CreateWindowExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
InternetReadFile
InternetSetFilePointer
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetCloseHandle
InternetOpenA
InternetConnectA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ