__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
5fdd92285cc80cd4a815a02cd0cb12357e5bc976ead2ca203c6f4b3805884984.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5fdd92285cc80cd4a815a02cd0cb12357e5bc976ead2ca203c6f4b3805884984.exe
Resource
win10v2004-20220812-en
Target
5fdd92285cc80cd4a815a02cd0cb12357e5bc976ead2ca203c6f4b3805884984
Size
80KB
MD5
d6d52b1a2262357974ad916a6ac04c2f
SHA1
790969d1904f65a84a7d88e8919feb8fdd639530
SHA256
5fdd92285cc80cd4a815a02cd0cb12357e5bc976ead2ca203c6f4b3805884984
SHA512
a046804b661d0da9122a4cb4f64d97708e0b811c82e2e7cfa0432482632940ccc792ae25206f43d080f1970e37b977c79568607f24fb2a4c724d7b26faab5d43
SSDEEP
1536:CbVa9JEZzg4qVhszs8uJ3txbtIL5VDhQiGkGmm5zwyP:EZzg4qVBJdIdVFlmCi
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AccessCheckByTypeResultListAndAuditAlarmA
AreAllAccessesGranted
GetSecurityDescriptorSacl
LookupAccountNameA
RegRestoreKeyA
StartServiceA
CloseHandle
CreateFileA
CreateHardLinkA
DeleteCriticalSection
DeleteVolumeMountPointW
EnterCriticalSection
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetDiskFreeSpaceW
GetEnvironmentStrings
GetExitCodeProcess
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetThreadTimes
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MoveFileExW
MultiByteToWideChar
RaiseException
RtlUnwind
ScrollConsoleScreenBufferW
SetComputerNameW
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
SetTimeZoneInformation
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
ChangeDisplaySettingsExA
CharUpperW
CheckMenuRadioItem
DdeSetUserHandle
EnumThreadWindows
GetDesktopWindow
GetKeyboardLayout
GetUserObjectInformationW
IsCharAlphaNumericA
IsCharLowerA
LoadAcceleratorsW
MessageBoxA
PeekMessageA
RegisterClassExA
TabbedTextOutA
UnhookWindowsHookEx
ValidateRgn
wsprintfA
wvsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ