__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
f91142ca2c04ca1a7df125c2bd0258632aaed345e87b388d661bd8f0ace6cdda.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f91142ca2c04ca1a7df125c2bd0258632aaed345e87b388d661bd8f0ace6cdda.exe
Resource
win10v2004-20220812-en
Target
f91142ca2c04ca1a7df125c2bd0258632aaed345e87b388d661bd8f0ace6cdda
Size
77KB
MD5
7118f6151d8206ef39ec18c8567260f6
SHA1
4ca0f63f533a1b5c9392d750f5f9b58cdc8da26e
SHA256
f91142ca2c04ca1a7df125c2bd0258632aaed345e87b388d661bd8f0ace6cdda
SHA512
314527a54e4add482fc8644553b2bbc15f80270fd953e341a70834a98a0561e98929ab45daa5e3b6dc880ebb2f41d277e355f890a63ecaa21c935f61142f14a1
SSDEEP
1536:9CbNol1ATaxlo7dtP8gWyS5ci+u1XG0Gq9d7h+t:9CbQiPCyAci+ujTVW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
EncryptFileA
CloseHandle
CreateFileA
ExitProcess
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcmpA
lstrcmpW
BeginDeferWindowPos
CallNextHookEx
CallWindowProcW
ChangeClipboardChain
CloseDesktop
CopyImage
CreateMDIWindowA
DdeQueryStringA
EnumThreadWindows
FindWindowExW
GetCapture
GetClientRect
GetIconInfo
GetKeyState
GetScrollPos
IsCharAlphaW
IsCharUpperA
IsIconic
LoadKeyboardLayoutA
LoadMenuW
LookupIconIdFromDirectory
LookupIconIdFromDirectoryEx
MessageBoxA
MessageBoxIndirectW
OemToCharBuffA
PostThreadMessageW
SendNotifyMessageA
SetMenuInfo
SetMessageExtraInfo
SetPropA
SetThreadDesktop
ShowOwnedPopups
SubtractRect
UnhookWindowsHookEx
UnregisterHotKey
UpdateWindow
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ