@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
Static task
static1
Behavioral task
behavioral1
Sample
c11afc4b40a9af5aa1f5f491319979e5a84e6fb4167d917c3ba2604c9586e3a6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c11afc4b40a9af5aa1f5f491319979e5a84e6fb4167d917c3ba2604c9586e3a6.dll
Resource
win10v2004-20220901-en
Target
c11afc4b40a9af5aa1f5f491319979e5a84e6fb4167d917c3ba2604c9586e3a6
Size
389KB
MD5
fa2d8147409c8e4f240e653513c61b6e
SHA1
05f110dc9fd22d60e2917e91bd4e109b96a7eeed
SHA256
c11afc4b40a9af5aa1f5f491319979e5a84e6fb4167d917c3ba2604c9586e3a6
SHA512
cef4edd50c321d01148ac2b5c9d15dcc1bf89edd611bfdf6cc8c4dfdc5884622929bdaa9d8db2154c90068149396e2363509ce79b4399b4c06b4b93d9410a4b3
SSDEEP
6144:lWNz4FmbU59ozMH0cFu069YbIY6QMId9N4IG68PS2f:lazPQ59oW+WEY6wLN416CSQ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CreateFileA
GetCommandLineA
DeleteFileA
EnterCriticalSection
CloseHandle
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
CreateToolhelp32Snapshot
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
ExitProcess
GetStdHandle
GetVersion
GetVolumeInformationA
GlobalMemoryStatus
InitializeCriticalSection
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
OpenProcess
Process32First
Process32Next
RaiseException
ReadFile
ReadProcessMemory
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
WriteProcessMemory
GetStartupInfoA
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE