BasicEntry
InstallEntryW
Start
Static task
static1
Behavioral task
behavioral1
Sample
e0c4b08a8a5d4ddc8bc8f0b54dd3ef0acd1972396e0b89b546749d648aca8a4a.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e0c4b08a8a5d4ddc8bc8f0b54dd3ef0acd1972396e0b89b546749d648aca8a4a.dll
Resource
win10v2004-20230220-en
Target
e0c4b08a8a5d4ddc8bc8f0b54dd3ef0acd1972396e0b89b546749d648aca8a4a
Size
2.6MB
MD5
0ce271d653c9e1ef1178fb1a26a01e22
SHA1
41dc3f14defa413838b7cce1b571a4dede99f9e0
SHA256
e0c4b08a8a5d4ddc8bc8f0b54dd3ef0acd1972396e0b89b546749d648aca8a4a
SHA512
3ecd0c013aa6d4d401f9f5754dc27a1e86f270e0023f4223ab9c3dac755b776b4e56da6d4f0449c5346d29af8dd18933717b24ed579d2be8fef23b4d77c172cb
SSDEEP
49152:fBzD/0T2NfbeLYw5P/neroQHQr1IDwzmQbs1tG2llkcI85fAjoA2d7+:fBHB2pne7a1mN1E8lkcf5Yjovq
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentThreadId
SetLastError
SetErrorMode
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
Sleep
LoadResource
SizeofResource
ReadFile
FindClose
CloseHandle
MulDiv
GetSystemTime
CreatePipe
PeekNamedPipe
lstrcmpW
lstrcmpiW
lstrcpynW
lstrlenA
lstrlenW
CreateMutexW
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
CreateProcessW
GetStartupInfoW
FindResourceW
FindResourceExW
GetSystemDirectoryW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
LocalFree
GetCommandLineW
GetWindowsDirectoryW
WritePrivateProfileStringW
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetFileSize
WriteFile
FlushFileBuffers
CreateFileW
DeviceIoControl
lstrcmpA
HeapFree
CreateFileA
RtlUnwind
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
GetStringTypeW
GetACP
GetProcessHeap
GetFileType
LCMapStringW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFilePointerEx
WriteConsoleW
WaitForSingleObjectEx
HeapReAlloc
HeapAlloc
HeapDestroy
GlobalMemoryStatusEx
GlobalUnlock
SetEndOfFile
GetSystemWindowsDirectoryW
FreeResource
InterlockedCompareExchange
GlobalAddAtomW
TerminateThread
GetPrivateProfileStringW
LocalAlloc
GetSystemInfo
ResetEvent
CreateDirectoryW
GetTempFileNameW
FormatMessageW
CopyFileW
ReleaseMutex
GetExitCodeProcess
GetFileAttributesExW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
SetFilePointer
WaitForMultipleObjects
GetExitCodeThread
MoveFileW
GetFileSizeEx
GlobalFree
MoveFileExW
GetFileAttributesW
SetFileAttributesW
GetTickCount
GetFullPathNameW
RemoveDirectoryW
GetDiskFreeSpaceExW
GetTempPathW
GetDriveTypeW
GetLogicalDriveStringsW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GlobalFindAtomW
GlobalDeleteAtom
OpenProcess
GetLongPathNameW
CreateEventW
SetEvent
GetCurrentProcess
GetStdHandle
GlobalLock
GlobalAlloc
FreeLibrary
LockResource
InterlockedDecrement
InterlockedIncrement
HeapSize
SetFileTime
GetFileInformationByHandle
GetModuleHandleA
InterlockedExchange
OutputDebugStringW
ExpandEnvironmentStringsW
GetModuleHandleW
SystemTimeToFileTime
GetLocalTime
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcAddress
lstrcmpiA
DecodePointer
LoadImageW
GetMonitorInfoW
DialogBoxParamW
ShowWindowAsync
IsIconic
SetTimer
KillTimer
GetSystemMetrics
MonitorFromPoint
UnregisterClassW
CharUpperW
DestroyMenu
AppendMenuW
TrackPopupMenu
UpdateWindow
GetCursorPos
PtInRect
CreatePopupMenu
RegisterWindowMessageW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
UnhookWinEvent
SetWinEventHook
MessageBoxW
SystemParametersInfoW
wsprintfW
SetCursor
OffsetRect
SetWindowRgn
CopyRect
PostQuitMessage
UpdateLayeredWindow
SetRect
IsRectEmpty
WaitForInputIdle
SendMessageTimeoutW
GetWindowThreadProcessId
FindWindowExW
PostThreadMessageW
SendMessageW
PostMessageW
DefWindowProcW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
IsChild
DestroyWindow
MonitorFromWindow
LoadCursorW
GetWindow
GetClassNameW
FindWindowW
GetParent
GetDesktopWindow
SetWindowLongW
GetWindowLongW
FillRect
GetSysColor
MapWindowPoints
ScreenToClient
ClientToScreen
GetWindowRect
GetClientRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
SetForegroundWindow
DestroyAcceleratorTable
CreateAcceleratorTableW
ReleaseCapture
SetCapture
GetFocus
SetFocus
CharNextW
GetDlgItem
BringWindowToTop
IsWindowVisible
SetWindowPos
MoveWindow
ShowWindow
EndDialog
AdjustTokenPrivileges
LookupPrivilegeValueW
GetUserNameW
EqualSid
DeleteAce
LookupAccountSidW
LookupAccountNameW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SetEntriesInAclW
RegQueryInfoKeyW
RegEnumKeyExW
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
GetExplicitEntriesFromAclW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
BuildExplicitAccessWithNameW
GetTokenInformation
GetTrusteeNameW
OpenProcessToken
ord165
ord680
ShellExecuteExW
SHCreateDirectoryExW
ord75
ShellExecuteW
SHGetSpecialFolderPathW
SHChangeNotify
CommandLineToArgvW
Shell_NotifyIconW
SHGetPathFromIDListW
SHBrowseForFolderW
SHFileOperationW
SHLoadInProc
SysStringLen
VariantInit
VariantClear
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysAllocStringLen
SysAllocStringByteLen
SysFreeString
SysAllocString
SysStringByteLen
PathFindFileNameW
PathRemoveFileSpecW
StrStrIW
wnsprintfW
PathAppendW
PathCombineW
SHDeleteValueW
PathIsPrefixW
StrToIntW
StrCmpIW
StrStrIA
StrTrimA
StrCmpNIW
PathFileExistsW
PathRelativePathToW
SHSetValueW
PathStripToRootW
PathFindExtensionW
wnsprintfA
wvnsprintfW
StrToInt64ExW
SHGetValueW
PathIsDirectoryW
SHGetValueA
SHSetValueA
StrCmpW
PathIsRelativeW
SHDeleteKeyW
InitCommonControlsEx
_TrackMouseEvent
GdipDrawImageRectRectI
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipDeleteStringFormat
GdipCreateStringFormat
GdipMeasureString
GdipDrawString
GdipDeleteFont
GdipCreateFont
GdiplusStartup
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipCloneImage
GdipFree
GdipAlloc
GdiplusShutdown
GdipCreateFontFamilyFromName
GdipSetTextRenderingHint
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCreateSolidFill
GdipDeleteBrush
GdipDrawImagePointRectI
GdipDeleteFontFamily
GdipDrawImageRectRect
GdipDeleteGraphics
GdipCreateBitmapFromFile
GdipCreateFromHDC
SelectObject
GetObjectW
SetTextColor
GetStockObject
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
DeleteDC
DeleteObject
SetBkMode
RestoreDC
SaveDC
SetViewportOrgEx
CreateFontIndirectW
GetCurrentObject
SetBkColor
CreateFontW
EnumFontFamiliesW
ExtTextOutW
CombineRgn
CreateRectRgn
GetDeviceCaps
CoInitialize
CoCreateGuid
OleRun
CoUninitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoGetClassObject
URLDownloadToCacheFileW
GetModuleFileNameExW
EnumProcesses
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpSetOption
WinHttpSendRequest
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpOpen
WinHttpAddRequestHeaders
WinHttpSetCredentials
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpQueryDataAvailable
GetAdaptersInfo
SetupIterateCabinetW
BasicEntry
InstallEntryW
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ