StartW
UpdateW
Static task
static1
Behavioral task
behavioral1
Sample
657948a33e70d61e5f8939571cf4c140.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
657948a33e70d61e5f8939571cf4c140.dll
Resource
win10v2004-20230220-en
Target
657948a33e70d61e5f8939571cf4c140.bin
Size
163KB
MD5
657948a33e70d61e5f8939571cf4c140
SHA1
372ab021bbdf261bc2b858025ccb3d1e9fb6dfdc
SHA256
065d399f6e84560e9c82831f9f2a2a43a7d853a27e922cc81d3bc5fcd1adfc56
SHA512
6404fc10e34c08259a3b5e8d71144d66c492d327d2f99d500595a485d27f936838390d01df9f3500d5032219e41809b1e2cc14511ccfbf736c841f5f572923fe
SSDEEP
3072:q97bXTUSpXLNl9vjBUCaLQ9L17ZDtKKxUQ//CVtcdCL9uKD3DFWmKd/NmOl6Zjh7:q97zTUSFplkqZlDD6e/FdY9uKDzk6ZF7
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapFree
GetLastError
HeapAlloc
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
CreateEventExW
SetEvent
WaitForSingleObjectEx
GlobalFree
GetCurrentProcess
LoadLibraryW
GetComputerNameW
IsWow64Process
TerminateProcess
WaitForSingleObject
CreateThread
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
LoadLibraryA
GetNativeSystemInfo
FreeLibrary
IsBadReadPtr
GetFileType
SetThreadContext
MapViewOfFile
CreateFileMappingW
GetModuleHandleW
CreateProcessW
GetProcAddress
GetThreadContext
CloseHandle
UnmapViewOfFile
ResumeThread
GetStdHandle
WriteConsoleW
CreateFileW
DecodePointer
LCMapStringW
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
HeapSize
SetStdHandle
SetFilePointerEx
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
CompareStringW
IsValidCodePage
FindNextFileW
GetWindowsDirectoryA
Sleep
FindFirstFileExW
FindClose
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
LocalFree
RtlUnwind
RaiseException
InterlockedFlushSList
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetTimeZoneInformation
HeapReAlloc
GetUserNameW
CredEnumerateW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
CredFree
SHGetSpecialFolderPathW
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
VariantClear
SysFreeString
SysAllocString
PathFileExistsA
WinHttpReceiveResponse
WinHttpOpen
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpOpenRequest
WinHttpSetOption
WinHttpCloseHandle
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpConnect
WinHttpCrackUrl
WinHttpQueryDataAvailable
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetStatusCallback
WinHttpReadData
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
GetAdaptersInfo
DetectAutoProxyUrl
StartW
UpdateW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ