?AntiAVFunctionOne@@YGPAXXZ
?AntiAVFunctionTwo@@YGPAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
8417021bbed256b40ffb8fff900f601ca88741baecccc87f4ec624d9938c16a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8417021bbed256b40ffb8fff900f601ca88741baecccc87f4ec624d9938c16a3.exe
Resource
win10v2004-20220812-en
Target
8417021bbed256b40ffb8fff900f601ca88741baecccc87f4ec624d9938c16a3
Size
96KB
MD5
93cda9c8318e7caabadc0509d94b63b4
SHA1
4770caef010001e13baca2dfb5227fa1a01fec68
SHA256
8417021bbed256b40ffb8fff900f601ca88741baecccc87f4ec624d9938c16a3
SHA512
d5131d1861ddd433927bfb1600100da3e4b55f664b02b29dd660f31ea8b312d273d5f12bf1e76b656e794784825ada2fab3d68212c9c7bdce1d14c4edc24bba6
SSDEEP
1536:MUA3Ha9lqPNeNjOuEynDewG0HDmSGjxBf0EHERZ5279jwqeGdgGf6kOsyetKLe:x9lXjOunDewGeMBfPs49HeXGf6kOs/KL
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleBaseNameA
GetProcessHeap
TlsSetValue
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
VirtualAlloc
GlobalFree
VirtualFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleHandleA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
WaitForSingleObject
HeapFree
CreateSemaphoreA
GetCurrentProcess
HeapAlloc
VirtualQuery
TlsGetValue
ReleaseSemaphore
LoadLibraryA
SetWindowTextA
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
LoadIconA
GetWindowRect
DestroyWindow
UpdateWindow
SetScrollInfo
ModifyMenuA
MoveWindow
GetActiveWindow
DrawTextA
GetWindowInfo
GetDC
SetWindowPos
FindWindowA
ReleaseDC
Polyline
CreateCompatibleDC
SelectObject
DeleteDC
LineTo
BitBlt
MoveToEx
EndPath
BeginPath
CreatePen
_except_handler3
memset
?AntiAVFunctionOne@@YGPAXXZ
?AntiAVFunctionTwo@@YGPAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ