@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
caf789eac51ea5644e47b3ee4cf32c7e43d0869493789962bb9664b9f8aa2571.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
caf789eac51ea5644e47b3ee4cf32c7e43d0869493789962bb9664b9f8aa2571.exe
Resource
win10v2004-20220901-en
Target
caf789eac51ea5644e47b3ee4cf32c7e43d0869493789962bb9664b9f8aa2571
Size
144KB
MD5
48f7a0d5d7337ed3a3a8502e86455680
SHA1
f887d2c71acad8aa7e1ec472e1d69f044e167b9b
SHA256
caf789eac51ea5644e47b3ee4cf32c7e43d0869493789962bb9664b9f8aa2571
SHA512
4393e9f04f47a4334f793ceba22d51486e33964adb2be958742cef4f62622bc24dce7c8e4002d2d2e7b788a40203ebfa5dc85e599cf8aede2a0ed1634042168f
SSDEEP
3072:H6bGdFFz+DN/UGUs85Hvy8AnXSDADeak7dJHB/A5:abGdFFCTUv5HsXSsQLH5A5
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
EnterCriticalSection
GetStartupInfoA
SetHandleCount
RtlUnwind
GetFileAttributesA
ExitProcess
CloseHandle
UnhandledExceptionFilter
SetEnvironmentVariableA
GetLastError
GetFileType
InitializeCriticalSection
GetModuleFileNameA
GetStdHandle
CreateFileA
GetPrivateProfileStringA
GetEnvironmentStrings
GetModuleHandleA
GetCommandLineA
SetFilePointer
GetLocalTime
SetConsoleCtrlHandler
GetCurrentDirectoryA
RaiseException
LeaveCriticalSection
SetCurrentDirectoryA
GetCurrentThreadId
GlobalMemoryStatus
GetVersion
GetEnvironmentVariableA
GetDriveTypeA
VirtualAlloc
VirtualFree
WriteFile
WritePrivateProfileStringA
GetProcAddress
SendDlgItemMessageA
RegisterClassA
PostQuitMessage
MessageBoxA
LoadStringA
LoadIconA
IsDlgButtonChecked
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetNextDlgTabItem
GetMessageA
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
EnumThreadWindows
LoadCursorA
EndDialog
DispatchMessageA
DialogBoxParamA
OffsetRect
DefWindowProcA
CopyRect
CheckDlgButton
SetFocus
TranslateMessage
SetWindowPos
GetStockObject
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ