?process4@@YAHH@Z
EngineProc
process1
process2
process3
Static task
static1
Behavioral task
behavioral1
Sample
04b284669ed850c7d5e6f6bac2adb4ff8583b2dbd1dee04000d17308e19460ca.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
04b284669ed850c7d5e6f6bac2adb4ff8583b2dbd1dee04000d17308e19460ca.dll
Resource
win10v2004-20221111-en
Target
04b284669ed850c7d5e6f6bac2adb4ff8583b2dbd1dee04000d17308e19460ca
Size
116KB
MD5
b211de6d7f8cae71d5e097e8841a35c0
SHA1
40cb1c07fac25389dbfb845a90d6b450095e9a4b
SHA256
04b284669ed850c7d5e6f6bac2adb4ff8583b2dbd1dee04000d17308e19460ca
SHA512
2d6f672a5d1f54a65577dee4061442ec853661f309d661d2241d7de65c32bf68a62545010dfb0e19d1a09462ce628da329644dc82d2fee2fa7e9aa81ff41e166
SSDEEP
1536:LvkjbR+vRkz7SlAvJXDQojFVycHLmL0Mxam0U08:4J+vm74AjvHHLmL0MxD0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord1098
ord371
ord1175
ord1084
ord293
ord577
ord266
ord265
ord1917
ord1187
ord1191
ord762
ord764
malloc
free
_resetstkoflw
_except_handler3
_vscwprintf
vswprintf
wcslen
strstr
printf
_snprintf
__CppXcptFilter
_adjust_fdiv
_initterm
_onexit
_open
_lseek
_close
_write
_stricmp
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
memset
memmove
strncpy
realloc
srand
rand
_access
isspace
strchr
strpbrk
time
atoi
sprintf
_CxxThrowException
__CxxFrameHandler
HeapReAlloc
OutputDebugStringW
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
ExitProcess
LocalFree
LoadLibraryA
CreateThread
GetCurrentThreadId
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FreeLibrary
GetModuleHandleA
lstrcmpA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
GetCurrentProcess
FlushInstructionCache
MulDiv
InterlockedDecrement
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteFileA
GetWindowsDirectoryA
CreateProcessA
GetProcessId
Thread32First
Thread32Next
GetModuleFileNameA
Sleep
WritePrivateProfileStringA
GetTickCount
HeapSize
OpenProcess
GetPriorityClass
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetPrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
lstrlenA
lstrlenW
lstrcmpiA
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
TranslateMessage
DispatchMessageA
GetMessageA
UpdateWindow
ShowWindow
RegisterClassA
LoadIconA
MessageBoxA
PeekMessageA
GetWindow
BeginPaint
EndPaint
CallWindowProcA
GetDesktopWindow
PostQuitMessage
InvalidateRect
ReleaseDC
SetWindowTextA
GetClientRect
FillRect
SetCapture
ReleaseCapture
GetSysColor
DefWindowProcA
SendMessageA
SetWindowLongA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
IsWindow
RegisterWindowMessageA
GetWindowTextLengthA
InvalidateRgn
GetWindowTextA
UnregisterClassA
GetWindowLongA
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
SetWindowPos
DestroyWindow
RedrawWindow
DestroyAcceleratorTable
GetDlgItem
SetFocus
GetFocus
GetDC
IsChild
CreateWindowExA
SelectObject
DeleteDC
DeleteObject
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
ShellExecuteA
PathFileExistsA
OleUninitialize
OleInitialize
CoTaskMemRealloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CoInitialize
CoCreateInstance
CoTaskMemFree
SysStringByteLen
SysAllocString
SysAllocStringLen
VariantInit
VariantChangeType
VariantCopy
VariantClear
SysFreeString
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
SysStringLen
?process4@@YAHH@Z
EngineProc
process1
process2
process3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE