download
getidex
skipcomponents
Static task
static1
Behavioral task
behavioral1
Sample
c63d648771e92866ca5dbf16916d019ae3eecd39be38f233539967beff594eb0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c63d648771e92866ca5dbf16916d019ae3eecd39be38f233539967beff594eb0.dll
Resource
win10v2004-20220812-en
Target
c63d648771e92866ca5dbf16916d019ae3eecd39be38f233539967beff594eb0
Size
21KB
MD5
9112273ef0cf205e74dfcdba0c67fe32
SHA1
c3cad85e76099eaa387379da949125a647660bdf
SHA256
c63d648771e92866ca5dbf16916d019ae3eecd39be38f233539967beff594eb0
SHA512
6cf86b5eba913b160b67841c15d12373e9c158b93d8389ea24a78537eba918fd84f5e602b65d351c11f557e93f62aaa07a3a15e63f79c8ff6733d9f6e5f489c3
SSDEEP
384:H8B6QpjHi8LGq/yWZB2i5Dp0P/zV6oMDGrQ+KQePNkDLJN7sHj17LW46J+vCq:H8B6o//ykBP5m/z4oMDGrDcNknLsHj1l
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileType
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
GetTempFileNameA
GetTempPathA
MulDiv
GetTickCount
CloseHandle
ReadFile
CreateFileA
DeleteFileA
WaitForMultipleObjects
WaitForSingleObject
GetCurrentProcess
SetFilePointer
GetModuleFileNameA
InterlockedExchange
RtlUnwind
SetEndOfFile
lstrlenA
CreateProcessA
GetLastError
WriteFile
LoadLibraryExA
VirtualQuery
GlobalAlloc
lstrcpynA
lstrcpyA
CreateEventA
GlobalFree
RegisterWindowMessageA
SetWindowLongA
SetDlgItemTextA
wsprintfA
SetWindowTextA
CallWindowProcA
DestroyWindow
EnableWindow
CharLowerBuffA
GetWindowLongA
CreateWindowExA
GetWindowRect
GetClientRect
SendMessageA
FindWindowExA
GetDlgItem
GetFocus
IsWindowVisible
ShowWindow
MessageBoxA
GetStockObject
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegEnumValueA
InternetConnectA
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetSetFilePointer
InternetCrackUrlA
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
HttpOpenRequestA
HttpSendRequestA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
download
getidex
skipcomponents
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ