?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
Static task
static1
Behavioral task
behavioral1
Sample
4d6a3ec8ab3fbc28d130910417a6c7087856dc5be0eb51b324f91d5e0b72f71f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4d6a3ec8ab3fbc28d130910417a6c7087856dc5be0eb51b324f91d5e0b72f71f.exe
Resource
win10v2004-20220812-en
Target
4d6a3ec8ab3fbc28d130910417a6c7087856dc5be0eb51b324f91d5e0b72f71f
Size
92KB
MD5
5248a0c2537bd882cf4a3efbfa1de600
SHA1
355db1d247d6d903d9563aacd25d03119cfb7f09
SHA256
4d6a3ec8ab3fbc28d130910417a6c7087856dc5be0eb51b324f91d5e0b72f71f
SHA512
ca6dad10fc0efd5d188456a2a0ea3aaf5a9cd90c315f179542b282c5b58648afd21eba6b40cbd9127e2fc1f6d9e902be246191c1b5a91394e6bbec518437eb8c
SSDEEP
1536:oDDDDPA2PFHdFY+cVK75SbEH/MqSHD42QpBiQ3zRoixE:oDDv7dRcVUoofMQZz3
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
GetModuleHandleA
GetSystemTime
GetTempPathA
TerminateThread
GetProcAddress
GetTickCount
CreateEventA
OpenEventA
LoadLibraryExW
VirtualFree
GetLocalTime
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
VirtualQuery
LoadImageA
DestroyWindow
SendMessageA
DdeSetQualityOfService
ImpersonateDdeClientWindow
LoadIconA
PostMessageA
send
?EnumWindowsProc@@YIHKK@Z
?Start1@@YAPAXPAX@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ