__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
84e25255a143bc5959af96a0dd6fc07b23b9d26ac7509d7edb180bc19feef2dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84e25255a143bc5959af96a0dd6fc07b23b9d26ac7509d7edb180bc19feef2dd.exe
Resource
win10v2004-20220901-en
Target
84e25255a143bc5959af96a0dd6fc07b23b9d26ac7509d7edb180bc19feef2dd
Size
132KB
MD5
44c560f5ac8e778514eab8ded068bd40
SHA1
9adc62aeb1ee3ab68e9cbfff786e9fd91b2ccc72
SHA256
84e25255a143bc5959af96a0dd6fc07b23b9d26ac7509d7edb180bc19feef2dd
SHA512
e042d094dc651f577af4bf30098ab99f039116f1ccc690c8e631af7235d89291f984444e41e9ab7d02716ae98c85429f2a11fb7dea9141824ca8d89000337dd0
SSDEEP
3072:6w/AAl5eB//E8K7rCI42F0ewPLSrLwLvKwUn0Xpnk:6wTl5eN/E8CtxKTQLwmwUn0Xpk
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegOpenKeyExA
RegSetValueExA
CloseHandle
CreateDirectoryA
CreateFileA
CreateFileW
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileAttributesW
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDefaultLangID
GetVersion
GetVersionExA
GetVolumeInformationA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LCMapStringA
LeaveCriticalSection
LoadLibraryA
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
lstrlenA
CloseWindow
EnumThreadWindows
FindWindowA
MessageBoxA
SetWindowTextA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ