a
b
c
Static task
static1
Behavioral task
behavioral1
Sample
b48d6f873eab59b450924d53c76c813d69028002333686979fe2f8dada836526.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b48d6f873eab59b450924d53c76c813d69028002333686979fe2f8dada836526.dll
Resource
win10v2004-20220812-en
Target
b48d6f873eab59b450924d53c76c813d69028002333686979fe2f8dada836526
Size
17KB
MD5
5a28b45cb0567d6f8d98d30d87310a3d
SHA1
417866fadcb01374202fe991def172bc5a31e966
SHA256
b48d6f873eab59b450924d53c76c813d69028002333686979fe2f8dada836526
SHA512
9e6915ad0cf1298d5a0fae08c3997c41af26a2c662a883363acbfc45cdbf7a177f6cd0fc15653a981680c6b5a8b3ea110cbcf9845c220dde96250071cca90ffc
SSDEEP
384:fOCdo+yvK9jan2Bd7aUS75aIgODBLj9c8ZrwRKCFUOBvgLOkt:mCa+y0a2Bd7aUSVapOFLj9curwACyWu
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileAttributesA
ReadFile
lstrcatA
MultiByteToWideChar
GetProcAddress
GlobalFree
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetTempPathA
lstrcpyA
CreateEventA
RtlUnwind
GlobalAlloc
WriteFile
GetProcessHeap
GetTickCount
HeapFree
HeapAlloc
lstrlenA
GetThreadLocale
GetSystemDefaultLCID
GetUserDefaultLCID
lstrcpynA
HeapReAlloc
SetFilePointer
lstrcmpA
CreateFileA
InterlockedExchange
GetLastError
VirtualQuery
SetDlgItemTextA
CallWindowProcA
EnableWindow
SetWindowTextA
IsWindowVisible
DestroyWindow
GetWindowRect
GetFocus
wsprintfA
GetClientRect
SendMessageA
RegisterWindowMessageA
SetWindowLongA
MessageBoxA
GetWindowLongA
GetForegroundWindow
GetKeyboardLayoutList
GetDlgItem
ShowWindow
CreateWindowExW
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegSetValueExA
HttpOpenRequestA
InternetSetFilePointer
FindCloseUrlCache
InternetOpenA
InternetCloseHandle
InternetConnectA
a
b
c
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ