BasicEntry
InstallEntryW
Start
Static task
static1
Behavioral task
behavioral1
Sample
3f0104ea2acb1d8116a6b56a0038c4798e81ac6b5dc2525e806c14210f1bc686.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3f0104ea2acb1d8116a6b56a0038c4798e81ac6b5dc2525e806c14210f1bc686.dll
Resource
win10v2004-20230220-en
Target
3f0104ea2acb1d8116a6b56a0038c4798e81ac6b5dc2525e806c14210f1bc686
Size
4.4MB
MD5
e69ba785e33c0fbb7a93577f0dd23ad8
SHA1
95818890fb164b41e4facbed00177054c2a47eac
SHA256
3f0104ea2acb1d8116a6b56a0038c4798e81ac6b5dc2525e806c14210f1bc686
SHA512
846a57a7e312311d0daa3c9bc8295e68306ab1c1d5606d56e7fe788e66edb43472285584238a7abd7a377463a8d77799f17864f33721b4eb6b658465948acf65
SSDEEP
98304:fBHB2pne7a1mN1E8lkcf5YjovKqGYiOE8oLj5jIrHLQ:fv1GGE5gyjovK65E8oqjLQ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentThreadId
SetLastError
SetErrorMode
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
Sleep
LoadResource
SizeofResource
ReadFile
FindClose
CloseHandle
MulDiv
GetSystemTime
CreatePipe
PeekNamedPipe
lstrcmpW
lstrcmpiW
lstrcpynW
lstrlenA
lstrlenW
CreateMutexW
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
CreateProcessW
GetStartupInfoW
FindResourceW
FindResourceExW
GetSystemDirectoryW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
LocalFree
GetCommandLineW
GetWindowsDirectoryW
WritePrivateProfileStringW
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetFileSize
WriteFile
FlushFileBuffers
CreateFileW
DeviceIoControl
lstrcmpA
HeapFree
CreateFileA
RtlUnwind
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
GetStringTypeW
GetACP
GetProcessHeap
GetFileType
LCMapStringW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFilePointerEx
WriteConsoleW
WaitForSingleObjectEx
HeapReAlloc
HeapAlloc
HeapDestroy
GlobalMemoryStatusEx
GlobalUnlock
SetEndOfFile
GetSystemWindowsDirectoryW
FreeResource
InterlockedCompareExchange
GlobalAddAtomW
TerminateThread
GetPrivateProfileStringW
LocalAlloc
GetSystemInfo
ResetEvent
CreateDirectoryW
GetTempFileNameW
FormatMessageW
CopyFileW
ReleaseMutex
GetExitCodeProcess
GetFileAttributesExW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
SetFilePointer
WaitForMultipleObjects
GetExitCodeThread
MoveFileW
GetFileSizeEx
GlobalFree
MoveFileExW
GetFileAttributesW
SetFileAttributesW
GetTickCount
GetFullPathNameW
RemoveDirectoryW
GetDiskFreeSpaceExW
GetTempPathW
GetDriveTypeW
GetLogicalDriveStringsW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GlobalFindAtomW
GlobalDeleteAtom
OpenProcess
GetLongPathNameW
CreateEventW
SetEvent
GetCurrentProcess
GetStdHandle
GlobalLock
GlobalAlloc
FreeLibrary
LockResource
InterlockedDecrement
InterlockedIncrement
HeapSize
SetFileTime
GetFileInformationByHandle
GetModuleHandleA
InterlockedExchange
OutputDebugStringW
ExpandEnvironmentStringsW
GetModuleHandleW
SystemTimeToFileTime
GetLocalTime
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcAddress
lstrcmpiA
DecodePointer
LoadImageW
GetMonitorInfoW
DialogBoxParamW
ShowWindowAsync
IsIconic
SetTimer
KillTimer
GetSystemMetrics
MonitorFromPoint
UnregisterClassW
CharUpperW
DestroyMenu
AppendMenuW
TrackPopupMenu
UpdateWindow
GetCursorPos
PtInRect
CreatePopupMenu
RegisterWindowMessageW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
UnhookWinEvent
SetWinEventHook
MessageBoxW
SystemParametersInfoW
wsprintfW
SetCursor
OffsetRect
SetWindowRgn
CopyRect
PostQuitMessage
UpdateLayeredWindow
SetRect
IsRectEmpty
WaitForInputIdle
SendMessageTimeoutW
GetWindowThreadProcessId
FindWindowExW
PostThreadMessageW
SendMessageW
PostMessageW
DefWindowProcW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
IsChild
DestroyWindow
MonitorFromWindow
LoadCursorW
GetWindow
GetClassNameW
FindWindowW
GetParent
GetDesktopWindow
SetWindowLongW
GetWindowLongW
FillRect
GetSysColor
MapWindowPoints
ScreenToClient
ClientToScreen
GetWindowRect
GetClientRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
SetForegroundWindow
DestroyAcceleratorTable
CreateAcceleratorTableW
ReleaseCapture
SetCapture
GetFocus
SetFocus
CharNextW
GetDlgItem
BringWindowToTop
IsWindowVisible
SetWindowPos
MoveWindow
ShowWindow
EndDialog
AdjustTokenPrivileges
LookupPrivilegeValueW
GetUserNameW
EqualSid
DeleteAce
LookupAccountSidW
LookupAccountNameW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SetEntriesInAclW
RegQueryInfoKeyW
RegEnumKeyExW
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
GetExplicitEntriesFromAclW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
BuildExplicitAccessWithNameW
GetTokenInformation
GetTrusteeNameW
OpenProcessToken
ord165
ord680
ShellExecuteExW
SHCreateDirectoryExW
ord75
ShellExecuteW
SHGetSpecialFolderPathW
SHChangeNotify
CommandLineToArgvW
Shell_NotifyIconW
SHGetPathFromIDListW
SHBrowseForFolderW
SHFileOperationW
SHLoadInProc
SysStringLen
VariantInit
VariantClear
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysAllocStringLen
SysAllocStringByteLen
SysFreeString
SysAllocString
SysStringByteLen
PathFindFileNameW
PathRemoveFileSpecW
StrStrIW
wnsprintfW
PathAppendW
PathCombineW
SHDeleteValueW
PathIsPrefixW
StrToIntW
StrCmpIW
StrStrIA
StrTrimA
StrCmpNIW
PathFileExistsW
PathRelativePathToW
SHSetValueW
PathStripToRootW
PathFindExtensionW
wnsprintfA
wvnsprintfW
StrToInt64ExW
SHGetValueW
PathIsDirectoryW
SHGetValueA
SHSetValueA
StrCmpW
PathIsRelativeW
SHDeleteKeyW
InitCommonControlsEx
_TrackMouseEvent
GdipDrawImageRectRectI
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipDeleteStringFormat
GdipCreateStringFormat
GdipMeasureString
GdipDrawString
GdipDeleteFont
GdipCreateFont
GdiplusStartup
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipCloneImage
GdipFree
GdipAlloc
GdiplusShutdown
GdipCreateFontFamilyFromName
GdipSetTextRenderingHint
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCreateSolidFill
GdipDeleteBrush
GdipDrawImagePointRectI
GdipDeleteFontFamily
GdipDrawImageRectRect
GdipDeleteGraphics
GdipCreateBitmapFromFile
GdipCreateFromHDC
SelectObject
GetObjectW
SetTextColor
GetStockObject
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
DeleteDC
DeleteObject
SetBkMode
RestoreDC
SaveDC
SetViewportOrgEx
CreateFontIndirectW
GetCurrentObject
SetBkColor
CreateFontW
EnumFontFamiliesW
ExtTextOutW
CombineRgn
CreateRectRgn
GetDeviceCaps
CoInitialize
CoCreateGuid
OleRun
CoUninitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoGetClassObject
URLDownloadToCacheFileW
GetModuleFileNameExW
EnumProcesses
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpSetOption
WinHttpSendRequest
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpOpen
WinHttpAddRequestHeaders
WinHttpSetCredentials
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpQueryDataAvailable
GetAdaptersInfo
SetupIterateCabinetW
BasicEntry
InstallEntryW
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ