__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
67dbdd36d0e87e43e5db7a8ce35ad49359ec9ab1f7cbcfdbbbe670386adf512f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67dbdd36d0e87e43e5db7a8ce35ad49359ec9ab1f7cbcfdbbbe670386adf512f.exe
Resource
win10v2004-20220901-en
Target
67dbdd36d0e87e43e5db7a8ce35ad49359ec9ab1f7cbcfdbbbe670386adf512f
Size
106KB
MD5
fdf8bb2564af155c1056b3d81e7da3bf
SHA1
1300fc05c2ffcd955ffa28a1457f673f85baacea
SHA256
67dbdd36d0e87e43e5db7a8ce35ad49359ec9ab1f7cbcfdbbbe670386adf512f
SHA512
4b8050c484f4c9b9bf2daded201db6269fdff8c78c1c4fb60b6a4a8ef07c8fce9a90ed0e450dae0b5a6dae5e1cc26ea4e9a1e2410acb2011b8f8cb2851b78d7a
SSDEEP
1536:53Jkc9R9JTK3oLVCOuULutUS5Y1JCBGcGYBokJwNI+9wgeY9HODqWX9xk2xl9gYZ:53J/R9JCOCLtUAY1JaWkJwNIvYdE9y
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
EnumThreadWindows
MessageBoxA
UnregisterClassA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE