?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
Static task
static1
Behavioral task
behavioral1
Sample
ce32fcafc3649dc382e90913dd4d835403752732195fdfdd8a53eec77d420450.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ce32fcafc3649dc382e90913dd4d835403752732195fdfdd8a53eec77d420450.exe
Resource
win10v2004-20220812-en
Target
ce32fcafc3649dc382e90913dd4d835403752732195fdfdd8a53eec77d420450
Size
92KB
MD5
a2045e71d4325e64899880b20a93c1a0
SHA1
7d09b43f09891c786e190c44091a9006ad1e8259
SHA256
ce32fcafc3649dc382e90913dd4d835403752732195fdfdd8a53eec77d420450
SHA512
f52bb9940eccafc19eee7914202047655e9bd64ada212fbcc332f44200a37e5e465ca3ea99eb78278e4b63ee12f7afe786f708b213ef8687768f6af9f5bba7b6
SSDEEP
1536:BDDDDPA2PFHdFY+cY0ZJSFmH/57oIHD42Qpfu2Rwx:BDDv7dRcYMYMf5QxnR
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
GetModuleHandleA
GetSystemTime
GetTempPathA
TerminateThread
GetProcAddress
GetTickCount
CreateEventA
OpenEventA
LoadLibraryExW
VirtualFree
GetLocalTime
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
VirtualQuery
LoadImageA
DestroyWindow
SendMessageA
DdeSetQualityOfService
ImpersonateDdeClientWindow
LoadIconA
PostMessageA
send
?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ