@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
f44eb5bd5f15e964ce4a8dd469fdfe687d2043e015f8c67c004a77344af2c59f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f44eb5bd5f15e964ce4a8dd469fdfe687d2043e015f8c67c004a77344af2c59f.exe
Resource
win10v2004-20221111-en
Target
f44eb5bd5f15e964ce4a8dd469fdfe687d2043e015f8c67c004a77344af2c59f
Size
2.8MB
MD5
961d0785603715b9693181c5ba7bfa26
SHA1
d854a49a8da7c94dc32d28279ce032d5901fb264
SHA256
f44eb5bd5f15e964ce4a8dd469fdfe687d2043e015f8c67c004a77344af2c59f
SHA512
ffc5fc64b07a4eb9465402fecd7a3bf33ec28309ae338f8d4e04fdc6f14b38f13fdb289c87d812567e22cc61652388a131715f3cabe76b6b447ea60f04dbc4e1
SSDEEP
49152:lgUs0N7Y2tvnMEwQbPvlKMNVaw5/3GBS9VyrPdaSkjAQztJvaQ:lggYcZagzHf
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
CloseHandle
CreateFileA
CreateFileW
CreateProcessA
CreateSemaphoreA
ExitProcess
FindResourceA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetSystemInfo
GetTempPathA
GetTimeZoneInformation
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
IsBadReadPtr
LCMapStringA
LoadLibraryA
LoadLibraryExA
LoadResource
LockResource
OpenProcess
RaiseException
ReadFile
ReleaseSemaphore
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SizeofResource
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WriteFile
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
EnumThreadWindows
MessageBoxA
wsprintfA
@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ