__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
99c34e2fdaa4c4222780f44e5b0d733447cccee351bd364638f4ad45937de045.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
99c34e2fdaa4c4222780f44e5b0d733447cccee351bd364638f4ad45937de045.exe
Resource
win10v2004-20221111-en
Target
99c34e2fdaa4c4222780f44e5b0d733447cccee351bd364638f4ad45937de045
Size
172KB
MD5
d9dc9dcec086fa8487b3c3a6226f2f67
SHA1
3d83e1a2b7a96c324a421f4d92c606b9e1742c85
SHA256
99c34e2fdaa4c4222780f44e5b0d733447cccee351bd364638f4ad45937de045
SHA512
002bfbc02a5f327f0164ea2aa358f486a6c5cd6ba1802447c5d3b2545777096d57016adff6af10781b6ab4cef6631044fb303f79ad764e36c13fe563f27b3a43
SSDEEP
1536:9xKNbnh2wZTaIKT6i2rpxdUJ5IGMwGEGPS7vxGMCg0oG8WqQ3Dne/0il5ptsKCi8:902wZA6iqUTIGAwGMLI8/8OPnvu2kt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
CreateFileA
CreateMutexA
CreateProcessA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindResourceA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetThreadContext
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
RaiseException
ReadProcessMemory
ResumeThread
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
SetThreadContext
SizeofResource
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualProtectEx
VirtualQuery
WriteFile
WriteProcessMemory
EnumThreadWindows
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ