?SETCONFIG@@YAXXZ
?hLOUD@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
de6546b4bba9f2b1e3d7d0bdab6c63926c35f099ee9e790f20d8f73fbb8488c6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de6546b4bba9f2b1e3d7d0bdab6c63926c35f099ee9e790f20d8f73fbb8488c6.exe
Resource
win10v2004-20220812-en
Target
de6546b4bba9f2b1e3d7d0bdab6c63926c35f099ee9e790f20d8f73fbb8488c6
Size
136KB
MD5
4c93d5c01fbff8f86a8f2219c8aff0eb
SHA1
344436a0f71dbd22b0da2061614f3021dd2a5522
SHA256
de6546b4bba9f2b1e3d7d0bdab6c63926c35f099ee9e790f20d8f73fbb8488c6
SHA512
5132094d88010b5b6a3a3b0c2e77caa151dd8a1f8a45d6dc83b206c0493da9dd778f455a527178a10e5e8cd374290e2056613f5b49028aabe93876be6b9789a9
SSDEEP
3072:5OdTmywT+2YFrTeiPnW4Y5nEpHvO3LjKsla3zXtcvDL:gdSywT+z/eiu4uOv8LnTD
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
GetThreadPriority
GetProcAddress
VirtualAlloc
CloseHandle
GetModuleHandleA
GetSystemTime
SuspendThread
SetStdHandle
GetLocaleInfoA
SetFilePointer
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
Sleep
ResumeThread
DeleteFileA
DeleteFileW
GetStartupInfoA
GetCommandLineA
GetVersionExA
IsBadWritePtr
IsBadReadPtr
HeapValidate
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
ExitProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
HeapAlloc
HeapReAlloc
MultiByteToWideChar
VirtualProtect
GetSystemInfo
VirtualQuery
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
FlushFileBuffers
wsprintfA
LoadBitmapW
GetDesktopWindow
ReleaseDC
MessageBoxA
DestroyWindow
CreatePen
AVIStreamCreate
AVIClearClipboard
?SETCONFIG@@YAXXZ
?hLOUD@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ