__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
a32281ae1113be2422b07b810b08dddd484d3fa8107c6dae762a3665b07bc4b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a32281ae1113be2422b07b810b08dddd484d3fa8107c6dae762a3665b07bc4b2.exe
Resource
win10v2004-20220812-en
Target
a32281ae1113be2422b07b810b08dddd484d3fa8107c6dae762a3665b07bc4b2
Size
176KB
MD5
b3ecceb624410cf3f300fd2069536322
SHA1
9430b7f288e6967d127a5205fcdcb11f7bdb9c20
SHA256
a32281ae1113be2422b07b810b08dddd484d3fa8107c6dae762a3665b07bc4b2
SHA512
20b4dd318bd58507cc57a7e32cc8c99a666dfaaa62b947fda446548d5990c07c267c663c15d961bbba57956d98b75224815da6a1f4f8588bd219026401703b0d
SSDEEP
3072:2DJ+f+fqzJHRwOnt2vkdsyEPCA8InN/9HqfNGkHPv3:aJ+bz1dkvkSyE6A1Np4Nbn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AllocateUserPhysicalPages
Beep
CloseHandle
CreateFileA
CreateProcessA
DeleteCriticalSection
EnterCriticalSection
EnumResourceNamesW
ExitProcess
GetACP
GetCPInfo
GetCommTimeouts
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDefaultUILanguage
GetVersion
GetVersionExA
GlobalFlags
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
IsBadWritePtr
LeaveCriticalSection
LoadLibraryA
MoveFileExW
OutputDebugStringW
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
SetProcessPriorityBoost
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
lstrcpyA
lstrcpyW
VerInstallFileA
ChooseColorA
AbortDoc
AddFontMemResourceEx
CheckColorsInGamut
CloseFigure
CopyEnhMetaFileW
CreateDCW
CreateDIBSection
EnumThreadWindows
GetUserObjectSecurity
LoadKeyboardLayoutW
MapWindowPoints
MessageBoxA
SetUserObjectInformationW
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ