?AntiAVFunctionOne@@YGPAXXZ
?AntiAVFunctionTwo@@YGPAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
56c324970c385b0150cfbe2ab274c6d5125ca4fa009bde0c83e1a7918bd013fc.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
56c324970c385b0150cfbe2ab274c6d5125ca4fa009bde0c83e1a7918bd013fc.dll
Resource
win10v2004-20221111-en
Target
56c324970c385b0150cfbe2ab274c6d5125ca4fa009bde0c83e1a7918bd013fc
Size
96KB
MD5
99cc4a7a74f21987d1c845601d4a9862
SHA1
48b7dc4189f040deb0e0abc8c5722906fe7e5b8d
SHA256
56c324970c385b0150cfbe2ab274c6d5125ca4fa009bde0c83e1a7918bd013fc
SHA512
715239eaa7953f3f57aaf606c5c78922c796ae282e42bc7ce2c242aa92a88007d520b58d12b1966f8db81c410a2d5fa7e0345d9a1208a3339f90c12184b80d78
SSDEEP
1536:nUA3Ha9TqPNe6jOPR9LS28m5S4pIdxSy86jjFwN3QY4RiOu79jwqeGdgGf6kOsyY:w9T0jOPR9LS28gpI+GjFKpOg9HeXGf6n
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleBaseNameA
GetProcessHeap
TlsSetValue
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
VirtualAlloc
GlobalFree
VirtualFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleHandleA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
WaitForSingleObject
HeapFree
CreateSemaphoreA
GetCurrentProcess
HeapAlloc
VirtualQuery
TlsGetValue
ReleaseSemaphore
LoadLibraryA
SetWindowTextA
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
LoadIconA
GetWindowRect
DestroyWindow
UpdateWindow
SetScrollInfo
ModifyMenuA
MoveWindow
GetActiveWindow
DrawTextA
GetWindowInfo
GetDC
SetWindowPos
FindWindowA
ReleaseDC
Polyline
CreateCompatibleDC
SelectObject
DeleteDC
LineTo
BitBlt
MoveToEx
EndPath
BeginPath
CreatePen
_except_handler3
memset
?AntiAVFunctionOne@@YGPAXXZ
?AntiAVFunctionTwo@@YGPAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ