?EnumWindowsProc@@YIHKK@Z
?Start1@@YGPAXPAX@Z
Static task
static1
Behavioral task
behavioral1
Sample
b659657b204073769956619d70ec18febfec327c47f8fd82e86269fbef200073.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b659657b204073769956619d70ec18febfec327c47f8fd82e86269fbef200073.exe
Resource
win10v2004-20220812-en
Target
b659657b204073769956619d70ec18febfec327c47f8fd82e86269fbef200073
Size
440KB
MD5
834af5ce0187ac18de3faffdfd117e30
SHA1
d0e1373d6d858afad1b2fcc72fbacb5683ba9a4c
SHA256
b659657b204073769956619d70ec18febfec327c47f8fd82e86269fbef200073
SHA512
10f9ccdead529a07603cc9a41c26f8fe549ecb32872ce9a9cdcc567c76b1c70db66577dd1a19e7c933f494745de73c21697ada6e5c3ae23b3bf6f58a3dcbcd75
SSDEEP
6144:NZZ1gjqGA3yLbaR3lk94Sg8gZf7Bv+GDDEwKbbNZK7VXjcZbucD6+lrkJglEreEY:nZ/9ySElgxAGVwbLKxQdf2+OrFlWrp
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
GetModuleHandleA
GetSystemTime
GetTempPathA
TerminateThread
GetProcAddress
GetTickCount
ResetEvent
CreateEventA
OpenEventA
VirtualAllocEx
VirtualFree
GetLocalTime
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
VirtualQuery
LoadImageA
PostMessageA
LoadIconA
MessageBoxW
SetActiveWindow
EnumWindows
DestroyWindow
SendMessageA
send
mmioCreateChunk
?EnumWindowsProc@@YIHKK@Z
?Start1@@YGPAXPAX@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ