@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
baa8cba81fb153141492b54e410fad0f527412eb1719a3e0ab7ebc6b5c4a6d19.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
baa8cba81fb153141492b54e410fad0f527412eb1719a3e0ab7ebc6b5c4a6d19.exe
Resource
win10v2004-20220901-en
Target
baa8cba81fb153141492b54e410fad0f527412eb1719a3e0ab7ebc6b5c4a6d19
Size
79KB
MD5
7bb90460366331896cace817d615f5bc
SHA1
61758d54feb3a6218c64118cbb56231ed6e5f42f
SHA256
baa8cba81fb153141492b54e410fad0f527412eb1719a3e0ab7ebc6b5c4a6d19
SHA512
8b91072a4c83ddf61fb5a23076db3f675c7f3d1b6fa53e901c06628b8109a7fe53ca2e169d97077b4730b12498607ba9888665707bb8bcb5c873e72d101d45bb
SSDEEP
1536:CtJo4F2KyPGaG/URaIrEcpTPxNHPs81/PPRjqWn1hgq:AJo4FU51rxVB+e
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetCurrentThreadId
GetFileSize
GetFileAttributesA
GetStartupInfoA
CloseHandle
FindNextFileA
GetCommandLineA
InitializeCriticalSection
GetVersion
CreateFileA
CreateThread
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GlobalMemoryStatus
GetEnvironmentStrings
GetStdHandle
FindFirstFileA
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
GetProcAddress
send
recv
listen
htons
gethostname
gethostbyname
connect
closesocket
bind
accept
socket
WSAStartup
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ