__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
78291b0d61f8eb043113a569e9be92eb7811c6c6f84403df8a7073b392fae22e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
78291b0d61f8eb043113a569e9be92eb7811c6c6f84403df8a7073b392fae22e.exe
Resource
win10v2004-20220812-en
Target
78291b0d61f8eb043113a569e9be92eb7811c6c6f84403df8a7073b392fae22e
Size
104KB
MD5
70376207052ea3bec090cc754ee4addd
SHA1
3383b83372515648b1fcbeea4d4a0bdb31e78340
SHA256
78291b0d61f8eb043113a569e9be92eb7811c6c6f84403df8a7073b392fae22e
SHA512
b8929190ffcc0ad50022e77bd1a303eea87e6ca90003e032555652002b0d21af3a07ad1848c7f8306353c483ff7124f29fc37b05176a236c037a74b5bf20b89d
SSDEEP
1536:9uU2V1gxOTewwX96qg8x+I854j4r8GkGrwzRyRJHVpRdOgo+rJ6qz+mDiwPnY:9u7gxOC6vIy4cPwcRVzE+1hHY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemTime
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
EnumThreadWindows
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE