?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
Static task
static1
Behavioral task
behavioral1
Sample
8fd78755213431e38902ce0c708dd424b98ab84d0057a952e045859277a2d5fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8fd78755213431e38902ce0c708dd424b98ab84d0057a952e045859277a2d5fa.exe
Resource
win10v2004-20220812-en
Target
8fd78755213431e38902ce0c708dd424b98ab84d0057a952e045859277a2d5fa
Size
92KB
MD5
64384fe35cc90ac42e4c30fc78809320
SHA1
aa86f4bd88090b050b7a303206b3e59831162fb8
SHA256
8fd78755213431e38902ce0c708dd424b98ab84d0057a952e045859277a2d5fa
SHA512
a590c746a5b30cd7265f3f3ffe1f3a1d7e73b2764fd9a0842517a7fdc83669572943ace7e09a3b4ae7402512ab92410456375c1c532efbac6d5ceccb3995d774
SSDEEP
1536:LDDDDPA2PFHdFY+cEI75SbEH/MqSHD42QpBiQ3+RoixE:LDDv7dRcECoofMQZz3
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
GetModuleHandleA
GetSystemTime
GetTempPathA
TerminateThread
GetProcAddress
GetTickCount
CreateEventA
OpenEventA
LoadLibraryExW
VirtualFree
GetLocalTime
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
VirtualQuery
LoadImageA
DestroyWindow
SendMessageA
DdeSetQualityOfService
ImpersonateDdeClientWindow
LoadIconA
PostMessageA
send
?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ