__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
d9af1b606268b66508ea114e85b7c7e406fcadc978236e0f77215b8aa67911ea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d9af1b606268b66508ea114e85b7c7e406fcadc978236e0f77215b8aa67911ea.exe
Resource
win10v2004-20221111-en
Target
d9af1b606268b66508ea114e85b7c7e406fcadc978236e0f77215b8aa67911ea
Size
148KB
MD5
cbc6b1b1c76a42a8356771f46bbd1dc7
SHA1
82039652507902879d18d32604a8ecb9d8654db6
SHA256
d9af1b606268b66508ea114e85b7c7e406fcadc978236e0f77215b8aa67911ea
SHA512
59f4f670309ed13fd782b9c891e15af06966cae3b9c622a52335fc00e22cf32a62a0be61afe8cd1c659f5597fd1119ed472ed3872c734aa5c44fca08ef9c74f2
SSDEEP
3072:gxgC+1shzFMxlFmbCIDVgLY1uR1KLaEmCwe/z5v:e+1WxOlQbCIDVgU1+sm+zJ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
EscapeCommFunction
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileSectionNamesW
GetProcAddress
GetProcessHeap
GetProfileStringA
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetTempFileNameA
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
LocalSize
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetConsoleScreenBufferSize
SetFileApisToANSI
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
EnumThreadWindows
GetCursorPos
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE