Start
StopA
Ver
Static task
static1
Behavioral task
behavioral1
Sample
a3e10a133e3efceeef7a83ef61cbf96e4f604de780c245fa7758ea3c3888b3ea.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3e10a133e3efceeef7a83ef61cbf96e4f604de780c245fa7758ea3c3888b3ea.dll
Resource
win10v2004-20221111-en
Target
a3e10a133e3efceeef7a83ef61cbf96e4f604de780c245fa7758ea3c3888b3ea
Size
148KB
MD5
a9d30a807b6deb3137156d34a86daac5
SHA1
44ed75813bda9cab9925846bbd634905b4c95177
SHA256
a3e10a133e3efceeef7a83ef61cbf96e4f604de780c245fa7758ea3c3888b3ea
SHA512
68b1ba0a421d8012971d5087b5019d1d9b37daedec08afcb8d077787d7236e4e9f31b57f26556893f65d20bc4e20e0e6aaa3f3b4323ff939f07829cab8bca10b
SSDEEP
1536:CakGLlK08VUE/xookh2VQq6sqMppWY0H02U2P/m4tfw4+cTllzf/Y/Ibn3p9ztoi:CYL41T/xTkUaq6wpEl3J+183pNtoshN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
MultiByteToWideChar
CreateProcessA
FreeEnvironmentStringsA
lstrcpyA
lstrlenA
GetEnvironmentStrings
lstrcmpA
lstrcatA
GetSystemDirectoryA
lstrcpynA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
SetFileTime
SystemTimeToFileTime
GetSystemTime
CreateFileA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
ReadFile
GetFileSize
OpenFile
FileTimeToSystemTime
GetFileTime
WriteFile
GetWindowsDirectoryA
Sleep
GetVersion
CreateDirectoryA
GetLastError
CreateMutexA
CopyFileA
DeleteFileA
GetModuleFileNameA
GetTempFileNameA
GetTempPathA
GetComputerNameA
CreateThread
GetEnvironmentVariableA
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
lstrlenW
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
SetFilePointer
GetStartupInfoA
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
LocalFree
HeapAlloc
HeapFree
RaiseException
VirtualProtect
VirtualAlloc
GetModuleHandleA
GetSystemInfo
VirtualQuery
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
MoveFileA
GetCurrentThreadId
GetCommandLineA
GetProcessHeap
VirtualFree
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCPInfo
GetOEMCP
LCMapStringA
LCMapStringW
GetClassNameA
SendMessageTimeoutA
SetWindowsHookExA
CallNextHookEx
SetWindowPos
RegisterWindowMessageA
GetAncestor
GetSystemMetrics
GetParent
wsprintfA
ShellExecuteA
CoCreateInstance
VarCmp
SysAllocString
SysAllocStringLen
VariantInit
SysFreeString
VariantClear
Netbios
Start
StopA
Ver
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ