?process4@@YAHH@Z
EngineProc
process1
process2
process3
Static task
static1
Behavioral task
behavioral1
Sample
3991f7f8fb3c96b7ca8daa2d3272b6a65665dd6fbe6bf9fab480ba6c0bba4a23.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3991f7f8fb3c96b7ca8daa2d3272b6a65665dd6fbe6bf9fab480ba6c0bba4a23.dll
Resource
win10v2004-20220901-en
Target
3991f7f8fb3c96b7ca8daa2d3272b6a65665dd6fbe6bf9fab480ba6c0bba4a23
Size
152KB
MD5
5edbbd5374b880376564247e144f4ada
SHA1
ac6b5c1381e789ba908e23bfb125d8728af8753b
SHA256
3991f7f8fb3c96b7ca8daa2d3272b6a65665dd6fbe6bf9fab480ba6c0bba4a23
SHA512
8b83e2add40560bcafc7c231c88db91177c856358b3cd050835ff87084731a4ba7e99e3b8c585db31e10a47123115738c26b5d8a6aff692df8d5e73b1381cd69
SSDEEP
1536:fno1E2tnawMgYR+qGTxSi9TqpmmRRK/89JQIt+owVREQfMuvyycmeUZyW0UlnLbi:wjeFRA/uQTHnRlnHLy/0lIDM+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord1098
ord371
ord1175
ord1084
ord293
ord577
ord266
ord265
ord1917
ord1187
ord1191
ord762
ord764
malloc
free
_resetstkoflw
_except_handler3
_vscwprintf
vswprintf
wcslen
strstr
printf
_snprintf
__CppXcptFilter
_adjust_fdiv
_initterm
_open
_lseek
_close
_write
_stricmp
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
memset
memmove
strncpy
realloc
srand
rand
_access
isspace
strchr
strpbrk
time
atoi
sprintf
_CxxThrowException
__CxxFrameHandler
HeapReAlloc
OutputDebugStringW
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
ExitProcess
LocalFree
LoadLibraryA
CreateThread
GetCurrentThreadId
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FreeLibrary
GetModuleHandleA
lstrcmpA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
GetCurrentProcess
FlushInstructionCache
MulDiv
InterlockedDecrement
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteFileA
GetWindowsDirectoryA
CreateProcessA
GetProcessId
Thread32First
Thread32Next
GetModuleFileNameA
Sleep
WritePrivateProfileStringA
GetTickCount
HeapSize
OpenProcess
GetPriorityClass
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetPrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
lstrlenA
lstrlenW
lstrcmpiA
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
RegisterClassA
LoadIconA
MessageBoxA
PeekMessageA
IsChild
GetWindow
BeginPaint
EndPaint
CallWindowProcA
GetDesktopWindow
DispatchMessageA
InvalidateRect
ReleaseDC
GetWindowTextA
GetClientRect
FillRect
SetCapture
ReleaseCapture
GetSysColor
DefWindowProcA
CreateWindowExA
SetWindowLongA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
IsWindow
PostQuitMessage
RegisterWindowMessageA
InvalidateRgn
GetWindowTextLengthA
UnregisterClassA
GetWindowLongA
SetWindowTextA
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
SetWindowPos
DestroyWindow
RedrawWindow
DestroyAcceleratorTable
GetDlgItem
SetFocus
GetDC
GetFocus
SendMessageA
DeleteObject
SelectObject
DeleteDC
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
PathFileExistsA
OleUninitialize
OleInitialize
CoTaskMemRealloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CoInitialize
CoCreateInstance
CoTaskMemFree
SysStringByteLen
SysAllocString
SysAllocStringLen
VariantInit
VariantChangeType
VariantCopy
VariantClear
SysFreeString
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
SysStringLen
?process4@@YAHH@Z
EngineProc
process1
process2
process3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE