?SETCONFIG@@YAXXZ
?hLOUD@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
f23ae1cb3aa4318000adb5b46bbfa66ed551067cae4b05bd2a654ca45a691a49.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f23ae1cb3aa4318000adb5b46bbfa66ed551067cae4b05bd2a654ca45a691a49.exe
Resource
win10v2004-20221111-en
Target
f23ae1cb3aa4318000adb5b46bbfa66ed551067cae4b05bd2a654ca45a691a49
Size
136KB
MD5
ed6ac3bd98034c642d7277f37c337e9e
SHA1
e6161146c918a58eae6fc0fad743df0163a36b59
SHA256
f23ae1cb3aa4318000adb5b46bbfa66ed551067cae4b05bd2a654ca45a691a49
SHA512
dc1f6f9fa32aaae86d15281746fcd67ccabdd4e3aa458965a95fd0ede533d6ce71314ec0dcab16ad8f3d17a165a5306482e4f3d0f6314c3a2752cb5f7b807c2e
SSDEEP
3072:5OdTmywT+2YFrTeiPnW4Z5nEpHvO3LjKsla3zXtcvDL:gdSywT+z/eiu4bOv8LnTD
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
GetThreadPriority
GetProcAddress
VirtualAlloc
CloseHandle
GetModuleHandleA
GetSystemTime
SuspendThread
SetStdHandle
GetLocaleInfoA
SetFilePointer
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
Sleep
ResumeThread
DeleteFileA
DeleteFileW
GetStartupInfoA
GetCommandLineA
GetVersionExA
IsBadWritePtr
IsBadReadPtr
HeapValidate
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
ExitProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
HeapAlloc
HeapReAlloc
MultiByteToWideChar
VirtualProtect
GetSystemInfo
VirtualQuery
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
FlushFileBuffers
wsprintfA
LoadBitmapW
GetDesktopWindow
ReleaseDC
MessageBoxA
DestroyWindow
CreatePen
AVIStreamCreate
AVIClearClipboard
?SETCONFIG@@YAXXZ
?hLOUD@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ