MinHookDisable
MinHookEnable
NewThread
addScript
ahkAssign
ahkExec
ahkExecuteLine
ahkFindFunc
ahkFindLabel
ahkFunction
ahkGetApi
ahkGetVar
ahkLabel
ahkPause
ahkPostFunction
ahkReady
g_FirstThreadID
g_ThreadExitApp
Static task
static1
Behavioral task
behavioral1
Sample
b7f96fbdfbfc844ce9010218346d6392adcf701d5ac33a838d1a502f3e3e7a3f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b7f96fbdfbfc844ce9010218346d6392adcf701d5ac33a838d1a502f3e3e7a3f.exe
Resource
win10v2004-20220812-en
Target
b7f96fbdfbfc844ce9010218346d6392adcf701d5ac33a838d1a502f3e3e7a3f
Size
1.5MB
MD5
a1616105e83350c97724654acd44c894
SHA1
ceb49cd3793b6a913d3cfa266e9175c2b8e52c68
SHA256
b7f96fbdfbfc844ce9010218346d6392adcf701d5ac33a838d1a502f3e3e7a3f
SHA512
f5465d7c2a676e0c853f18d2cb1a2e5b3fa821e7651abca7cb470931b265d2435026eb86d92455141ee9c557efe1f8234449b885ab74aa24fc994dd5844fd95a
SSDEEP
24576:2EjvG9DB7/BDdIRlsFTvayt4VU5x+v8BlA/9zTejh1SM0XCaakSoc2EXEKSpQrJe:2jv7pSR4Zu5T+lYnSocZ0KSpX
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WSAGetLastError
getservbyname
htonl
send
recv
inet_addr
WSAAsyncSelect
inet_ntoa
gethostbyname
WSASetLastError
ioctlsocket
htons
gethostbyaddr
getservbyport
ntohs
WSAStartup
gethostname
shutdown
WSACleanup
closesocket
connect
socket
joyGetPosEx
mciSendStringW
joyGetDevCapsW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ImageList_GetIconSize
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
ImageList_ReplaceIcon
CreateStatusWindowW
StrCmpLogicalW
HashData
CryptStringToBinaryA
CryptBinaryToStringA
CryptStringToBinaryW
GetProcessImageFileNameW
InternetCloseHandle
InternetReadFileExA
InternetReadFile
InternetOpenW
InternetOpenUrlW
EnableThemeDialogTexture
SetWindowTheme
IsAppThemed
DwmGetWindowAttribute
LoadResource
SizeofResource
OpenEventW
SetEvent
LocalFree
GlobalLock
GlobalAlloc
GlobalFree
GlobalUnlock
WideCharToMultiByte
GetCPInfo
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetEnvironmentVariableW
DeleteCriticalSection
CreateEventW
WaitForSingleObject
GetModuleHandleA
GetModuleHandleExW
GetCurrentProcessId
GetLastError
lstrcmpiW
GetStringTypeExW
CreateThread
SetThreadPriority
GetExitCodeThread
CreateMutexW
LoadLibraryW
MultiByteToWideChar
SystemTimeToFileTime
SetFilePointerEx
ReadFile
SetFilePointer
GlobalSize
lstrcpyA
lstrlenA
lstrcmpiA
lstrcmpA
LocalFileTimeToFileTime
CreateDirectoryA
CreateDirectoryW
IsBadReadPtr
CreateFileW
CreateFileA
WriteFile
SetFileTime
DuplicateHandle
GetCurrentProcess
GetModuleHandleW
GetCurrentDirectoryA
GetLocalTime
FileTimeToDosDateTime
GetFileInformationByHandle
GetFileSize
lstrlenW
FindFirstFileW
FindNextFileW
FindClose
UnmapViewOfFile
CreateFileMappingW
SetErrorMode
SetLastError
FlushInstructionCache
GetTempPathA
HeapAlloc
HeapReAlloc
VirtualAlloc
VirtualFree
GetProcessHeap
HeapCreate
HeapFree
HeapDestroy
GetCommandLineW
GetThreadLocale
VirtualQuery
GetVersionExW
IsValidCodePage
IsBadStringPtrW
GetModuleFileNameW
GetFileAttributesW
SetCurrentDirectoryW
OpenProcess
GetFullPathNameW
OpenThread
QueueUserAPC
SetDllDirectoryW
GetShortPathNameW
Beep
MoveFileW
OutputDebugStringW
CreateProcessW
GetProcessId
GetExitCodeProcess
WriteProcessMemory
ReadProcessMemory
TerminateProcess
SetPriorityClass
SetEnvironmentVariableW
GetDateFormatW
GetTimeFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
DeviceIoControl
SetVolumeLabelW
GetVolumeInformationW
GetDiskFreeSpaceW
GetCurrentDirectoryW
DeleteFileW
CopyFileW
SetFileAttributesW
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
GetFileSizeEx
GetDateFormatEx
GetTickCount64
GetSystemTime
GetSystemDefaultUILanguage
GetComputerNameW
GetSystemWindowsDirectoryW
GetTempPathW
FormatMessageW
QueryDosDeviceW
CompareStringW
RemoveDirectoryW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetPrivateProfileStringW
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
WritePrivateProfileSectionW
HeapWalk
HeapSize
SetEndOfFile
GetACP
GetFileType
GetStdHandle
FileTimeToSystemTime
IsWow64Process
VirtualAllocEx
VirtualFreeEx
EnumResourceNamesW
LoadLibraryExW
GetCurrentThreadId
VirtualProtect
Sleep
FindResourceW
LeaveCriticalSection
EnterCriticalSection
CloseHandle
InitializeCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
SleepEx
GetTickCount
MulDiv
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwind
RaiseException
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCommandLineA
ExitThread
FreeLibraryAndExitThread
ExitProcess
HeapQueryInformation
LCMapStringW
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
FindFirstFileExW
LockResource
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
DecodePointer
FlushFileBuffers
MapViewOfFile
WriteConsoleW
SetLayeredWindowAttributes
InvalidateRect
EnableWindow
SetWindowTextW
GetWindowTextLengthW
EnumWindows
IsZoomed
IsIconic
GetLayeredWindowAttributes
GetClientRect
EnumDisplayMonitors
GetMonitorInfoW
GetIconInfo
RegisterWindowMessageW
DefWindowProcW
SetForegroundWindow
DialogBoxParamW
MonitorFromPoint
SendDlgItemMessageW
SetDlgItemTextW
AdjustWindowRect
GetDlgItem
MessageBeep
GetCursorInfo
GetLastInputInfo
GetSystemMenu
GetMenuItemCount
GetMenuItemID
GetSubMenu
GetMenuStringW
ExitWindowsEx
SetScrollInfo
ScrollWindow
GetPropW
FlashWindow
GetClassLongW
SetMenu
SetPropW
RemovePropW
GetSysColor
GetClassInfoExW
RedrawWindow
SetParent
DrawTextW
AdjustWindowRectEx
DefDlgProcW
GetAncestor
UpdateWindow
GetMessagePos
GetSysColorBrush
FillRect
CallWindowProcW
CheckRadioButton
IntersectRect
GetUpdateRect
PtInRect
CreateDialogIndirectParamW
CreateAcceleratorTableW
InsertMenuItemW
RemoveMenu
SetMenuItemInfoW
GetMenuItemInfoW
SetMenuDefaultItem
CreateMenu
CreatePopupMenu
SetMenuInfo
DestroyMenu
TrackPopupMenuEx
CopyImage
CreateIconIndirect
CreateIconFromResourceEx
DrawIconEx
EnumClipboardFormats
GetWindow
BringWindowToTop
GetQueueStatus
SetWindowRgn
GetShellWindow
SystemParametersInfoW
RegisterClassExW
LoadCursorW
DestroyWindow
DestroyAcceleratorTable
UnregisterClassW
DestroyIcon
MapVirtualKeyW
VkKeyScanExW
MapVirtualKeyExW
GetKeyboardLayoutNameW
ActivateKeyboardLayout
GetGUIThreadInfo
GetWindowTextW
mouse_event
keybd_event
SetKeyboardState
GetKeyboardState
GetCursorPos
GetAsyncKeyState
AttachThreadInput
SendInput
UnregisterHotKey
RegisterHotKey
PostQuitMessage
SendMessageTimeoutW
CharUpperW
UnhookWindowsHookEx
SetWindowsHookExW
IsCharAlphaNumericW
IsCharUpperW
IsCharLowerW
ToUnicodeEx
GetKeyboardLayout
CallNextHookEx
CharLowerW
ReleaseDC
GetDC
MessageBoxW
OpenClipboard
GetClipboardData
GetClipboardFormatNameW
CloseClipboard
SetClipboardData
EmptyClipboard
ChangeWindowMessageFilter
PostMessageW
FindWindowW
GetSystemMetrics
IsWindow
DispatchMessageW
TranslateMessage
PostThreadMessageW
ShowWindow
CountClipboardFormats
SetWindowLongW
ScreenToClient
IsDialogMessageW
WindowFromPoint
SendMessageW
IsWindowEnabled
GetWindowLongW
GetKeyState
TranslateAcceleratorW
SetFocus
IsChild
MapWindowPoints
SetActiveWindow
EnumChildWindows
ClientToScreen
MoveWindow
GetWindowRect
IsCharAlphaW
BlockInput
CheckMenuItem
CharLowerA
EnumThreadWindows
IsWindowVisible
LoadImageW
RemoveClipboardFormatListener
AddClipboardFormatListener
KillTimer
PeekMessageW
GetFocus
GetClassNameW
GetWindowThreadProcessId
GetForegroundWindow
GetMessageW
SetTimer
GetScrollInfo
GetParent
GetDlgCtrlID
IsClipboardFormatAvailable
LoadAcceleratorsW
EnableMenuItem
GetMenu
SetWindowPos
GetLastActivePopup
CreateWindowExW
EndDialog
CreateEllipticRgn
CreateFontW
DeleteObject
CreateRoundRectRgn
CreateRectRgn
GetObjectW
GdiFlush
CreateDIBSection
EnumFontFamiliesExW
SetBrushOrgEx
CreatePatternBrush
GetClipBox
SetBkMode
SetTextColor
GetDeviceCaps
CreatePolygonRgn
CreateCompatibleDC
CreateFontIndirectW
GetStockObject
CreateSolidBrush
GetCharABCWidthsW
GetTextMetricsW
GetPixel
CreateDCW
BitBlt
CreateCompatibleBitmap
DeleteDC
GetSystemPaletteEntries
SelectObject
GetDIBits
SetBkColor
OpenProcessToken
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
RegDeleteValueW
RegDeleteKeyExW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptEncrypt
CryptDecrypt
CryptDestroyKey
RegConnectRegistryW
RegCloseKey
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
GetUserNameW
CreateProcessWithLogonW
OpenSCManagerW
LockServiceDatabase
RegQueryValueExW
UnlockServiceDatabase
CloseServiceHandle
LookupPrivilegeValueW
AdjustTokenPrivileges
SHGetPathFromIDListW
DragFinish
SHGetKnownFolderPath
ExtractIconW
DragQueryPoint
SHEmptyRecycleBinW
SHFileOperationW
DragQueryFileW
SHBrowseForFolderW
SHGetDesktopFolder
SHGetMalloc
SHGetFolderPathW
SHCreateItemFromParsingName
ShellExecuteExW
Shell_NotifyIconW
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoReleaseMarshalData
CoInitialize
CoUninitialize
CoTaskMemFree
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetObject
StringFromGUID2
CreateStreamOnHGlobal
SafeArrayGetElemsize
SafeArrayAccessData
SafeArrayUnlock
SafeArrayPtrOfIndex
SafeArrayLock
SafeArrayUnaccessData
SafeArrayGetLBound
SafeArrayGetUBound
VariantCopyInd
SafeArrayCopy
SysAllocString
SafeArrayGetDim
OleLoadPicture
VariantChangeType
SafeArrayDestroy
GetActiveObject
SysStringLen
SysFreeString
SafeArrayCreate
VariantClear
SysStringByteLen
MinHookDisable
MinHookEnable
NewThread
addScript
ahkAssign
ahkExec
ahkExecuteLine
ahkFindFunc
ahkFindLabel
ahkFunction
ahkGetApi
ahkGetVar
ahkLabel
ahkPause
ahkPostFunction
ahkReady
g_FirstThreadID
g_ThreadExitApp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ