?SETCONFIG@@YAXXZ
?hLOUD@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
ab61cc472af810d0863baa2e1cb47f64c227fdfcbabb9ee16cffe6b3322172b0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ab61cc472af810d0863baa2e1cb47f64c227fdfcbabb9ee16cffe6b3322172b0.exe
Resource
win10v2004-20220812-en
Target
ab61cc472af810d0863baa2e1cb47f64c227fdfcbabb9ee16cffe6b3322172b0
Size
136KB
MD5
20af10f32e79ca48b3f107586c465530
SHA1
d56802ffb9d1d90a04384b3b785c0e1ae60ab595
SHA256
ab61cc472af810d0863baa2e1cb47f64c227fdfcbabb9ee16cffe6b3322172b0
SHA512
d46a41b06460c792cc071c78898ddea6616383844892085f1b6a09aaf5ee850cec07f64bea797285e2b4ac989a4a49f0309fa7f0b63c74d1faf6ad5bb13d50f8
SSDEEP
3072:5OdTmywT+2YFrTeiPnW4VB9cpHvAZXjK89mzXtcvDL:gdSywT+z/eiu4B2vkX7HD
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
GetThreadPriority
GetProcAddress
VirtualAlloc
CloseHandle
GetModuleHandleA
GetSystemTime
SuspendThread
SetStdHandle
GetLocaleInfoA
SetFilePointer
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
Sleep
ResumeThread
DeleteFileA
DeleteFileW
GetStartupInfoA
GetCommandLineA
GetVersionExA
IsBadWritePtr
IsBadReadPtr
HeapValidate
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
ExitProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
HeapAlloc
HeapReAlloc
MultiByteToWideChar
VirtualProtect
GetSystemInfo
VirtualQuery
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
FlushFileBuffers
wsprintfA
LoadBitmapW
GetDesktopWindow
ReleaseDC
MessageBoxA
DestroyWindow
CreatePen
AVIStreamCreate
AVIClearClipboard
?SETCONFIG@@YAXXZ
?hLOUD@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ