?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
Static task
static1
Behavioral task
behavioral1
Sample
c2abaae88fe91870087f7195591c10cc0fd1329099e43d804b9f586c87203b48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2abaae88fe91870087f7195591c10cc0fd1329099e43d804b9f586c87203b48.exe
Resource
win10v2004-20220812-en
Target
c2abaae88fe91870087f7195591c10cc0fd1329099e43d804b9f586c87203b48
Size
92KB
MD5
0fda26aeed2ae0fea53aba2606f45540
SHA1
5f27368d3f746e9cd379d6bb693f84c71af3c79b
SHA256
c2abaae88fe91870087f7195591c10cc0fd1329099e43d804b9f586c87203b48
SHA512
77f40690fc397ad92b5aa4a8b2d80da85dd76bb9933b628dfc7b58bf23d62dcaef9c07c769fa1f78e747235acd856acdc10f70339b76cbe8c99ec3792a9669c1
SSDEEP
1536:5KASBTdLX+jAC8REcHdF0U+c1u75SbEH/MqSHD42QpBiQ30RoixE:AAyeQdYc1AoofMQZz3
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
GetTickCount
GetModuleHandleA
GetSystemTime
GetTempPathA
TerminateThread
GetProcAddress
CreateEventA
OpenEventA
VirtualAllocEx
VirtualFree
GetLocalTime
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
VirtualQuery
LoadImageA
PostMessageA
LoadIconA
EnumWindows
DestroyWindow
SendMessageA
send
mmioCreateChunk
?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ