__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
c0c45e4f09fb0add833fbc599ef1a1895f92280beb2b469110179ad0e05ca3bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0c45e4f09fb0add833fbc599ef1a1895f92280beb2b469110179ad0e05ca3bb.exe
Resource
win10v2004-20220812-en
Target
c0c45e4f09fb0add833fbc599ef1a1895f92280beb2b469110179ad0e05ca3bb
Size
116KB
MD5
933f5df45b81ac604eba47fd753125bb
SHA1
e0cede822e38496b3aa08bae0c421b15316c25d2
SHA256
c0c45e4f09fb0add833fbc599ef1a1895f92280beb2b469110179ad0e05ca3bb
SHA512
11c87d112bf80d0efa6a5a567fc798c245a38f3af134de47587281e8ec64d88db6fdf32e2d33be9602ccb1ae96a66c6c33a17d6bc00d96df7fee7096c2391c9d
SSDEEP
3072:EsTCd0Otxa6avDfIDTlOVvlLMXg+Rd0s4ny:EsT40OnboI/lkvlL+5Rd0s1
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CommConfigDialogW
ConvertDefaultLocale
CreateFileA
CreateJobObjectW
CreateMutexW
DeleteCriticalSection
EnterCriticalSection
ExitProcess
ExitThread
FindFirstFileExA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetLogicalDriveStringsW
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
lstrcmpiW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
DuplicateIcon
ExtractAssociatedIconA
ExtractIconExW
FindExecutableW
ShellAboutA
ChangeMenuA
CloseClipboard
CopyAcceleratorTableA
CreateWindowExA
EnumThreadWindows
GetKeyboardType
GetMessageExtraInfo
GetWindowModuleFileNameA
MessageBoxA
SetCursorPos
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ