__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
f841379d2a6fe07b3a9c3de85bdbb70e4e6200cdafd6f179b2e1ada84e36ebfc.exe
Resource
win7-20221111-en
Target
f841379d2a6fe07b3a9c3de85bdbb70e4e6200cdafd6f179b2e1ada84e36ebfc
Size
113KB
MD5
3b10b983051a46917b8d3bcb9a83ead0
SHA1
d6cb77d4a1c844da09d4d549939a468a0cecb621
SHA256
f841379d2a6fe07b3a9c3de85bdbb70e4e6200cdafd6f179b2e1ada84e36ebfc
SHA512
31f75d14a70361458d17583ae04fb1f030cb0be312203989b1e28e4cf621eedfd72a2acd165d461916f5f638562d97eca679db4e08bc068ee1b217315b3eb8bc
SSDEEP
3072:cUHh1Ncp9alrr31wryxoDgp4VTnzAytEgaVrBT6:cUHhq+3+rGoMpOrUkEjt6
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
ExitProcess
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTickCount
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
MapViewOfFile
OpenFileMappingA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnumThreadWindows
GetMessageA
KillTimer
MessageBoxA
PostQuitMessage
RegisterClassA
SetTimer
TranslateMessage
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE