__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
7198ea4a383366f333472c98c57978dc73d44468ea0eccfea87727f9bfc2025c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7198ea4a383366f333472c98c57978dc73d44468ea0eccfea87727f9bfc2025c.exe
Resource
win10v2004-20220901-en
Target
7198ea4a383366f333472c98c57978dc73d44468ea0eccfea87727f9bfc2025c
Size
132KB
MD5
07d3d78fd0fbc052157d5f6f722c4c0d
SHA1
0f5a9de001e178d9b92f4e193dce807c82d46477
SHA256
7198ea4a383366f333472c98c57978dc73d44468ea0eccfea87727f9bfc2025c
SHA512
83a75e575517cce0d2dbb9f1e8f34a749c2560253e3359adc25c3a08627d4a3647fdf69350fbbda0499de5244e5473d39d3d39423c09ab57d10087390bafb473
SSDEEP
3072:Spw+ry7qscjqGhzBlRLYj4HapBrMrMJuaASPoaZ69Hz+d:cw+rUqscjqGh/5Yj2IR7DA+O96d
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesA
GetFileTime
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDriveStringsA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetTempPathA
GetThreadContext
GetUserDefaultLCID
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OpenFile
RaiseException
ReadFile
ReadProcessMemory
ResumeThread
RtlUnwind
SetConsoleCtrlHandler
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetThreadContext
SetThreadLocale
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WaitForSingleObject
WideCharToMultiByte
WriteFile
WriteProcessMemory
EnumThreadWindows
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ