_DecodePointerInternal@4
_EncodePointerInternal@4
Static task
static1
Behavioral task
behavioral1
Sample
8b1d1f45cee8a26df4ce17d9f48943173c751aa5025728019bff76ac082a55a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b1d1f45cee8a26df4ce17d9f48943173c751aa5025728019bff76ac082a55a7.exe
Resource
win10v2004-20220812-en
Target
8b1d1f45cee8a26df4ce17d9f48943173c751aa5025728019bff76ac082a55a7
Size
488KB
MD5
b2358a96acf9bc1d5e750bb06ef4c53f
SHA1
06a7777827d82312f7601e14d4e879c022c652f3
SHA256
8b1d1f45cee8a26df4ce17d9f48943173c751aa5025728019bff76ac082a55a7
SHA512
ed887e24182418f792177604f7e837078e7a78d5c8b7ff4a104fa8e1b915226243ccaf638d57a2ea53e615ac850bc60a49e3ff2dbb9bc22f58eaec5534ed08ad
SSDEEP
6144:bDYWR5J+Wnp8JZt1u3s+++yPmhbyonmqZ2TLdwMpvXVQF4WaoGDeReFt7u:bDtPJKQ7v5yamCmwjUeRej
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcessId
OpenProcess
GetNativeSystemInfo
EndUpdateResourceW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetEvent
CreateEventW
LoadResource
LockResource
SizeofResource
FindResourceW
GetEnvironmentVariableW
ExpandEnvironmentStringsW
CreateDirectoryW
DeleteFileW
GetFileAttributesW
GetTempFileNameW
ReadFile
Sleep
GetCurrentProcess
GetSystemInfo
GetSystemDirectoryW
GetWindowsDirectoryW
GetVersionExW
GetModuleFileNameW
GlobalAlloc
GlobalFree
LocalFree
FormatMessageW
CopyFileW
GetDateFormatW
GetTimeFormatW
CompareStringW
WideCharToMultiByte
GetVersion
GetModuleHandleW
HeapSetInformation
SetFilePointer
GetDiskFreeSpaceExW
CreateFileW
DeleteCriticalSection
CreateThread
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrlenW
MulDiv
GetTickCount
SetEndOfFile
GetExitCodeProcess
LoadLibraryW
SwitchToThread
InterlockedCompareExchange
GetTempPathW
InterlockedExchange
FindNextFileW
UpdateResourceA
BeginUpdateResourceA
FindResourceA
lstrlenA
DeleteFileA
CreateFileA
UpdateResourceW
BeginUpdateResourceW
GetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
HeapReAlloc
LCMapStringW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
OutputDebugStringW
LoadLibraryExW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
HeapSize
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
IsProcessorFeaturePresent
HeapAlloc
TlsFree
TlsSetValue
TlsGetValue
FindFirstFileW
FindClose
GetProcAddress
FreeLibrary
WaitForSingleObject
GetLastError
CloseHandle
WriteFile
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
RaiseException
LoadLibraryExA
GetCommandLineW
RtlUnwind
InterlockedDecrement
GetCPInfo
HeapFree
SetLastError
InterlockedIncrement
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
GetStdHandle
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetStockObject
EnumFontFamiliesExW
DeleteObject
CreateFontIndirectW
GetObjectW
GetTextMetricsW
SelectObject
GetTextExtentPoint32W
GetDeviceCaps
DeleteDC
CreateCompatibleDC
CoUninitialize
CoInitialize
GetComputerObjectNameW
ShellExecuteExW
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
ShellExecuteA
SystemParametersInfoW
IsDialogMessageW
LoadImageW
LoadIconW
LoadCursorW
SetClassLongW
ScreenToClient
SetCursor
GetClientRect
SetWindowTextW
ShowScrollBar
SetForegroundWindow
EnableWindow
MsgWaitForMultipleObjects
SetFocus
SendDlgItemMessageW
SetDlgItemTextW
GetDlgItem
CreateDialogIndirectParamW
CreateDialogParamW
MoveWindow
ShowWindow
DestroyWindow
SendMessageW
SendMessageA
PeekMessageW
DispatchMessageW
TranslateMessage
ExitWindowsEx
MessageBoxW
ReleaseDC
GetDC
DrawTextW
GetSystemMetrics
GetDialogBaseUnits
MessageBoxA
GetWindowRect
GetFocus
CertGetCertificateChain
CertFreeCertificateChain
CertVerifyCertificateChainPolicy
InternetCrackUrlW
InternetCombineUrlW
ord8
ord78
ord150
ord92
_DecodePointerInternal@4
_EncodePointerInternal@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ