download
getidex
skipcomponents
Static task
static1
Behavioral task
behavioral1
Sample
c020e3ca1c7c173e38118ebdc7f34ca31826d47ef0151e8e4fc28415fce5c45f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c020e3ca1c7c173e38118ebdc7f34ca31826d47ef0151e8e4fc28415fce5c45f.dll
Resource
win10v2004-20221111-en
Target
c020e3ca1c7c173e38118ebdc7f34ca31826d47ef0151e8e4fc28415fce5c45f
Size
21KB
MD5
32ac4fd08d64c86136e04694b57103fd
SHA1
27c0f731da2dad6d553f59324fde0aa63df4b09e
SHA256
c020e3ca1c7c173e38118ebdc7f34ca31826d47ef0151e8e4fc28415fce5c45f
SHA512
3754a2ca9541b4b98e365ef94aba9916849b104e28c34914350ce9dd186fe9b2bc6bb4c3cdb85dd9f20853d85beb424066e97f32ae2c59b2ae6163ed6524f010
SSDEEP
384:pZxYU8U/GH827ksk5akTk9l5kfDCrhWO/8XkAUYU/URU7UJUtUUU6U58xJETk3kL:pZxth/Gc27ksk5akTk9l5kfexxtseIWP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryExA
GetProcAddress
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
GetTempFileNameA
GetTempPathA
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
DeleteFileA
WaitForMultipleObjects
FindClose
CreateEventA
SetFilePointer
GetModuleFileNameA
InterlockedExchange
RtlUnwind
FreeLibrary
lstrlenA
CreateProcessA
GetLastError
GlobalAlloc
lstrcpynA
VirtualQuery
lstrcpyA
WaitForSingleObject
GlobalFree
RegisterWindowMessageA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
GetWindowRect
GetWindowTextA
CallWindowProcA
CharLowerBuffA
DestroyWindow
EnableWindow
GetWindowLongA
CreateWindowExA
FindWindowExA
GetDlgItem
GetFocus
IsWindowVisible
ShowWindow
GetClientRect
wsprintfA
RegCloseKey
RegOpenKeyA
RegSetValueExA
RegEnumValueA
RegQueryValueExA
InternetConnectA
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetSetFilePointer
InternetCrackUrlA
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
HttpOpenRequestA
HttpSendRequestA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
download
getidex
skipcomponents
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ