__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
b9fb9b56ade9caa690738cff86deb1b27f2c8a3bfd8bbb52392024c11e6ac403.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9fb9b56ade9caa690738cff86deb1b27f2c8a3bfd8bbb52392024c11e6ac403.exe
Resource
win10v2004-20220812-en
Target
b9fb9b56ade9caa690738cff86deb1b27f2c8a3bfd8bbb52392024c11e6ac403
Size
100KB
MD5
c4875377c431e84de228d3c5297a055a
SHA1
8de9bbb7e4b1f9d7a10bbb0ad9f7904ad8b155f9
SHA256
b9fb9b56ade9caa690738cff86deb1b27f2c8a3bfd8bbb52392024c11e6ac403
SHA512
20fb2e6a97567ff5a42f67e7f9b7a2960a38ab20969edcd2486b56f8dd9c3558f8aadd3849f461d273b26274f34517faa72c4b12a42da98a1ebf9c2da17d2c65
SSDEEP
1536:YI1OYDpk3CjMj0ODYMcrj8nsl+uq58BDp3shq9uiNAsps9aQ+2c544H91GUGSzrM:ZMYDpjICrjXdqwcmAsQdSjHjzrnS
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
AdjustTokenPrivileges
DeleteAce
GetAce
GetNamedSecurityInfoA
GetTokenInformation
LookupAccountSidA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetEntriesInAclA
SetNamedSecurityInfoA
SetServiceStatus
StartServiceCtrlDispatcherA
CloseHandle
CreateFileA
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
ExitThread
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetThreadContext
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalFree
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalFree
MultiByteToWideChar
OpenProcess
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetFilePointer
SetHandleCount
SetLastError
SetThreadLocale
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WinExec
WriteFile
lstrcpyA
lstrlenA
WSACancelBlockingCall
WSACleanup
WSAGetLastError
WSAIsBlocking
WSAStartup
closesocket
connect
gethostbyname
gethostname
htons
ioctlsocket
inet_addr
recv
select
send
socket
EnumThreadWindows
ExitWindowsEx
GetClientRect
MessageBoxA
SendMessageA
wsprintfA
FtpPutFileA
InternetCloseHandle
InternetConnectA
InternetOpenA
GetAdaptersInfo
GetTcpTable
EnumProcessModules
EnumProcesses
GetModuleFileNameExA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ