@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
01755ce3b7136315444e75bcdeeab67a048dcfdbea009510c1446d227bd2b01d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
01755ce3b7136315444e75bcdeeab67a048dcfdbea009510c1446d227bd2b01d.exe
Resource
win10v2004-20221111-en
Target
01755ce3b7136315444e75bcdeeab67a048dcfdbea009510c1446d227bd2b01d
Size
1.2MB
MD5
17a2a1b1844c8be661c6e6597b757aa0
SHA1
2a546908d06472373e442a3510e217f9544041e8
SHA256
01755ce3b7136315444e75bcdeeab67a048dcfdbea009510c1446d227bd2b01d
SHA512
edd2cea78dac19abf842bc93303e8f162ba734eeaf706b44cdcc686c7d884d86c9c0ced09219676bfee51dfeeaa3952ed326e3be9c71b447b0cf39c0787190c1
SSDEEP
12288:fYl+G2yJQHVeX2TALwSDPqY8JbEaY4Eug1Rp7WzxW+T0y5T9r1+2Y2fBwIKi:A0IJOVeX2MLj2nJb18fGnIy3r1R1wf
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegSetValueA
CloseHandle
CreateDirectoryA
CreateFileA
CreateFileW
CreateProcessA
DeleteFileA
EnterCriticalSection
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesW
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SetHandleCount
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
ShellExecuteA
EnumThreadWindows
MessageBoxA
MessageBoxExA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ