DoWorkEx
DoWorkWl
Static task
static1
Behavioral task
behavioral1
Sample
753694c65b888a6639bba9ae1107377479b35492b77c8c0b4b500aad82a5aaf5.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
753694c65b888a6639bba9ae1107377479b35492b77c8c0b4b500aad82a5aaf5.dll
Resource
win10v2004-20221111-en
Target
753694c65b888a6639bba9ae1107377479b35492b77c8c0b4b500aad82a5aaf5
Size
30KB
MD5
00d8badfa73969c55c5425cb3bd676f0
SHA1
1f9f96ff221e8c16fbc5df0f398c0ff152ab0345
SHA256
753694c65b888a6639bba9ae1107377479b35492b77c8c0b4b500aad82a5aaf5
SHA512
534f634e790828c3959469ad49bcb859a1b3b210998de774138b90c45a9219f4e36c960fcfd8d2629a0920b1d373f82888caa0c9c4dc1d4e35c7f4503f0b9943
SSDEEP
192:wE8QSsm3mca9rUokqw4mZZY19zHJU+rySYsI/TI7+63o7:wRZmN150ZAVrySpUTI7+6S
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrlenA
CloseHandle
WriteFile
CreateFileA
lstrcmpiA
GetModuleFileNameA
DisableThreadLibraryCalls
CreateThread
SetFileTime
GetFileTime
GetEnvironmentVariableA
Sleep
DeleteFileA
FreeLibraryAndExitThread
ExitProcess
WaitForSingleObject
GetProcAddress
lstrcmpA
ReadFile
SetFilePointer
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
VirtualFreeEx
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenW
MultiByteToWideChar
GetCurrentProcess
lstrcpyA
FreeLibrary
CreateEventA
LoadLibraryA
wsprintfA
WaitForInputIdle
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
InternetOpenA
HttpQueryInfoA
InternetReadFile
InternetSetOptionA
InternetCloseHandle
InternetOpenUrlA
??2@YAPAXI@Z
_adjust_fdiv
malloc
_initterm
free
_except_handler3
memcpy
strchr
memset
??3@YAXPAX@Z
__CxxFrameHandler
_EH_prolog
DoWorkEx
DoWorkWl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ