__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
dc6bca7176bbebceb92ca91ea5f57471b5634489605b909f43114f1d8dc63b83.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dc6bca7176bbebceb92ca91ea5f57471b5634489605b909f43114f1d8dc63b83.exe
Resource
win10v2004-20220812-en
Target
dc6bca7176bbebceb92ca91ea5f57471b5634489605b909f43114f1d8dc63b83
Size
79KB
MD5
f8da705e8526b44d64675b228aa7d466
SHA1
5d50d6c883572e6c07fbc51ec3c6a975d316f312
SHA256
dc6bca7176bbebceb92ca91ea5f57471b5634489605b909f43114f1d8dc63b83
SHA512
440cd265d3e58774ad9a1fe935d135fddf000a1bced5dc866423a235157e8b894b57af35cb19f2624469d06a0ea10660b26b822d0c84b306c15b6fc3363398a1
SSDEEP
1536:fbvszMfXJqQhwzeeZpHC6FBx8UTO5JcovGhaG3FAzKBp9:jfXJqQACYTcJ0yzQ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AbortSystemShutdownW
AddAccessAllowedAceEx
GetSidSubAuthority
LookupAccountSidA
PrivilegedServiceAuditAlarmA
QueryServiceLockStatusW
RegEnumKeyA
RegQueryInfoKeyA
RegQueryValueExW
RegRestoreKeyA
CloseHandle
CreateDirectoryExA
CreateFileA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetACP
GetCPInfo
GetCommMask
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetLongPathNameW
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetThreadContext
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
MultiByteToWideChar
PeekNamedPipe
QueryPerformanceCounter
RaiseException
RegisterWaitForSingleObjectEx
ReplaceFileW
RtlUnwind
SetConsoleCtrlHandler
SetFileAttributesA
SetFilePointer
SetHandleCount
SetLastError
SetLocaleInfoA
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcmpiA
CharLowerA
CheckDlgButton
CreateDesktopA
DdeInitializeW
DdeQueryNextServer
DragDetect
EnableScrollBar
EnumThreadWindows
GetClassLongW
GetInputState
GetWindowWord
LoadStringW
MessageBoxA
SetWindowPos
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ