@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
f6f2ccc08e85fca5b687137a20357e8facc77a91d9f545cd850bbc7c8a3d8b8a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f6f2ccc08e85fca5b687137a20357e8facc77a91d9f545cd850bbc7c8a3d8b8a.exe
Resource
win10v2004-20221111-en
Target
f6f2ccc08e85fca5b687137a20357e8facc77a91d9f545cd850bbc7c8a3d8b8a
Size
86KB
MD5
b8679c7ecf1148339e7c72b647533f23
SHA1
d67e69acc9e9b52b0e6fe5a71b7ca9f16dabc20a
SHA256
f6f2ccc08e85fca5b687137a20357e8facc77a91d9f545cd850bbc7c8a3d8b8a
SHA512
453789708e2428822f0817fff048cc0ccd6747e0cf43b0f5b047388c1c437b88b0e36093f4dc684428c19d749d3bbcc61fa5283ba545afa47ba896681517b519
SSDEEP
1536:yu7FhUYQ8StgoLtQTgG32zldf9FzPpMeX:D7FhUsoLyT8DxX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetFileAttributesA
EnterCriticalSection
CloseHandle
GetCommandLineA
GetConsoleMode
GetCurrentThreadId
GetEnvironmentStrings
CreateFileA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetProcAddress
GetStartupInfoA
ExitProcess
GetVersion
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
PeekConsoleInputA
RaiseException
ReadConsoleInputA
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetConsoleMode
SetFilePointer
SetHandleCount
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
GetStdHandle
MessageBoxA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ