__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
1f3cd148c80cf86d94b285f6097652da77e05b933887540a6af0bd2faa11139d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f3cd148c80cf86d94b285f6097652da77e05b933887540a6af0bd2faa11139d.exe
Resource
win10v2004-20220812-en
Target
1f3cd148c80cf86d94b285f6097652da77e05b933887540a6af0bd2faa11139d
Size
201KB
MD5
53b6adbfacf48eff60eeb61fc3671ff0
SHA1
2fa4ea9b53b9be677a6cc5eaaf3e8085000b65a6
SHA256
1f3cd148c80cf86d94b285f6097652da77e05b933887540a6af0bd2faa11139d
SHA512
9289a9d9eb33e73ae90f69c68710d9abacd04d60ad836517a6baefd367ecf0352e15e78f96aa387fd94f0c5011e9573eabdd020b0c65db8793a4acbc192d0694
SSDEEP
6144:oInKWKhznTLkj7KxSsTfrjykDZ+j9iqS+/:4fdxSSfr1+S+/
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemInfo
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
RaiseException
RegisterWaitForSingleObjectEx
RtlUnwind
SearchPathA
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WriteFile
DragAcceptFiles
DuplicateIcon
ExtractAssociatedIconA
ShellExecuteA
ShellExecuteW
Shell_NotifyIconW
EnumThreadWindows
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE