?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
Static task
static1
Behavioral task
behavioral1
Sample
6b6d400d843bfae09ffd9950eeb3c8551bcb25318ea2217fe320383717929af9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b6d400d843bfae09ffd9950eeb3c8551bcb25318ea2217fe320383717929af9.exe
Resource
win10v2004-20220812-en
Target
6b6d400d843bfae09ffd9950eeb3c8551bcb25318ea2217fe320383717929af9
Size
92KB
MD5
91ed1d742702d031ab53381e66ed5100
SHA1
b94bfbd2723df50543cb6561ffef37ace83d955e
SHA256
6b6d400d843bfae09ffd9950eeb3c8551bcb25318ea2217fe320383717929af9
SHA512
1f876959bdf375db00fe4b53ca012fa93d975112679ffd0dcbd90ac55ade66a9a80fce68d479c8adf048ba6a684aa317a6c5c8a7ecc85b152a646e111f5d94f9
SSDEEP
1536:IDDDDPA2PFHdFY+cQ675SbEH/MqSHD42QpBiQ3FRoixE:IDDv7dRcQEoofMQZz3
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
GetModuleHandleA
GetSystemTime
GetTempPathA
TerminateThread
GetProcAddress
GetTickCount
CreateEventA
OpenEventA
LoadLibraryExW
VirtualFree
GetLocalTime
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
VirtualQuery
LoadImageA
DestroyWindow
SendMessageA
DdeSetQualityOfService
ImpersonateDdeClientWindow
LoadIconA
PostMessageA
send
?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ