__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
0cd0093a6522493a7e41ccff7bd92494e20e6ad0103e744535bad92c0385d55b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0cd0093a6522493a7e41ccff7bd92494e20e6ad0103e744535bad92c0385d55b.exe
Resource
win10v2004-20221111-en
Target
0cd0093a6522493a7e41ccff7bd92494e20e6ad0103e744535bad92c0385d55b
Size
41KB
MD5
28995bcf181221d2824f5b3cd76bec40
SHA1
2219018d0c5e5a4e662e0885722d527533ab66d7
SHA256
0cd0093a6522493a7e41ccff7bd92494e20e6ad0103e744535bad92c0385d55b
SHA512
ee76c7c1d5790865ca7f6be45870aff8ee381d22287ec66237ee14dc6afd5f809bac8d419c431b9a36bbbb422d64f83903f651a4988ad12c12bf05ea4abd2af1
SSDEEP
768:JKu1GBRxZ3Lu0iPsCyt+w7noFHfkHr5GnFvsKCpQX/zH2d1PKyZwZha3+3FGTyia:JHixkvwtih5nFyqrH2Giohau3wTx08a
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
RegCloseKey
Netbios
WSAStartup
GetBoundsRect
ShellExecuteA
wsprintfA
CoInitialize
PathGetArgsA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE