?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
dd2e6425fbe5c11b36e5fb68c359f09b40d7330e53e85465f1a3e65e0173228f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd2e6425fbe5c11b36e5fb68c359f09b40d7330e53e85465f1a3e65e0173228f.exe
Resource
win10v2004-20220812-en
Target
dd2e6425fbe5c11b36e5fb68c359f09b40d7330e53e85465f1a3e65e0173228f
Size
82KB
MD5
89442c04c415980c0cb0cddb34d4b80b
SHA1
4dc4980b34984da038db60f285c463c6a2bc573f
SHA256
dd2e6425fbe5c11b36e5fb68c359f09b40d7330e53e85465f1a3e65e0173228f
SHA512
c2a82dec47fc2a7630dee95a19c8b5b4e008533d7d816d5977e137319cbbd4b46909d68a008bb3050d67d3ad27d9810974bf9569f0ae29758392bbb8c7b2f10c
SSDEEP
1536:S5i3SsJnjNvYnw3R5KmiDBJJCHoUDQN+0XOCmDYfHu+oCoWYakn2bsxC:S5i31x4w3HGVLCHx8eCmcfv+W1kass
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
_except_handler3
GetModuleFileNameExA
HeapFree
WaitForSingleObject
VirtualFree
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
HeapDestroy
HeapCreate
VirtualAlloc
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
CompareStringA
GetCurrentThreadId
WriteProcessMemory
SuspendThread
GetProcessHeap
GetCurrentProcess
CreateSemaphoreA
GetFileSize
ReleaseSemaphore
LoadLibraryA
CloseHandle
HeapAlloc
GetFullPathNameA
CreateFileA
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowInfo
LoadIconA
GetWindowRect
DestroyWindow
ShowWindow
PostMessageA
SetWindowTextA
UpdateWindow
ModifyMenuA
MoveWindow
GetActiveWindow
GetDC
FindWindowA
SetScrollInfo
ReleaseDC
DrawTextA
BeginPath
EndPath
TextOutA
MoveToEx
BitBlt
LineTo
DeleteDC
SelectObject
CreateCompatibleDC
Polyline
CreatePen
GetPath
PolyDraw
?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ