__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
a5b3947a12f7dcf55d2a894df7db25b1cd19f1c4c110982bdf095ff30b63108a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a5b3947a12f7dcf55d2a894df7db25b1cd19f1c4c110982bdf095ff30b63108a.exe
Resource
win10v2004-20220901-en
Target
a5b3947a12f7dcf55d2a894df7db25b1cd19f1c4c110982bdf095ff30b63108a
Size
303KB
MD5
66162624df9766a8f4c290f765a5f024
SHA1
f9114d6ed623ed4408fabc165475df5b30a61bc9
SHA256
a5b3947a12f7dcf55d2a894df7db25b1cd19f1c4c110982bdf095ff30b63108a
SHA512
e6a3c68823a2a2d7a32a11bec1cccfcaa840c93971fec6c2088484cc43fd9477ae23187ecfc0fdbd90583238c5899358feb0d86886f6ede9e72b673be9cf95bd
SSDEEP
6144:z0SUwrDBG7Bmv0iRe6QJk9QrZ+R/cSpYzHat/253SEIIKDVDC4:bB6NFW/cSOu5ASExKDVG
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AddAccessAllowedAce
GetSecurityDescriptorGroup
GetSecurityDescriptorLength
GetSidIdentifierAuthority
InitializeAcl
LookupAccountSidW
LookupPrivilegeNameA
RegRestoreKeyA
SetFileSecurityW
SetServiceStatus
CloseHandle
CreateDirectoryExW
CreateFileA
DeleteCriticalSection
DnsHostnameToComputerNameW
EnterCriticalSection
ExitProcess
FindFirstFileA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDefaultLangID
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryW
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
ExtractAssociatedIconA
ExtractIconExA
FindExecutableA
ShellAboutA
Shell_NotifyIconA
Shell_NotifyIconW
EnumThreadWindows
GetDlgItemTextA
GetKeyboardState
InsertMenuItemW
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ