Adh
Always
ConfigCast
GetPlayerVersion
HaahSBd
IJHEHd
PlayA
PrioritSetAd
PutAdSpecial
PutAdsware
SetAdrkOn
StandupYoured
UPAdInfo
adee
jlkjde
plkeAq
Static task
static1
Behavioral task
behavioral1
Sample
f05a7cc5e9aa1b7797dca9e5e6e5f2312e81b7c8d67bec9fc5691cebfa60fe9c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f05a7cc5e9aa1b7797dca9e5e6e5f2312e81b7c8d67bec9fc5691cebfa60fe9c.dll
Resource
win10v2004-20220812-en
Target
f05a7cc5e9aa1b7797dca9e5e6e5f2312e81b7c8d67bec9fc5691cebfa60fe9c
Size
283KB
MD5
13ff55366d60cc3673153adfe2043d9e
SHA1
19bb63e30db9d52678e9f6f7118cb3fdb12da05d
SHA256
f05a7cc5e9aa1b7797dca9e5e6e5f2312e81b7c8d67bec9fc5691cebfa60fe9c
SHA512
79550761db3540de73931387a9df2bea920aa82d6375eb312393dd37544dfbea1966a53b6a2486707e5c448997198a70cc8eb108d4b38b64e4cfc78fdc62d858
SSDEEP
6144:MfadEEbyp11RiAUnkKtTE80f0DP4Qo5IToQvkGdwzRy3x1w7z997zsx9VD:MfadEE6RipYr35ITOgi91cD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
gethostbyname
CoTaskMemFree
InternetCrackUrlA
URLDownloadToFileA
GetForegroundWindow
CreateRectRgn
InitializeSecurityDescriptor
SysAllocString
Adh
Always
ConfigCast
GetPlayerVersion
HaahSBd
IJHEHd
PlayA
PrioritSetAd
PutAdSpecial
PutAdsware
SetAdrkOn
StandupYoured
UPAdInfo
adee
jlkjde
plkeAq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE