__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
0cb9b343a8e8468084ba84f2360b70c0b08137f85569c376a0ca45003ce6bc7d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0cb9b343a8e8468084ba84f2360b70c0b08137f85569c376a0ca45003ce6bc7d.exe
Resource
win10v2004-20220812-en
Target
0cb9b343a8e8468084ba84f2360b70c0b08137f85569c376a0ca45003ce6bc7d
Size
179KB
MD5
ff71a73217e597c939f5e3fd99a5b70f
SHA1
1954a04ae1bd28f0293577a9cf5261f692865871
SHA256
0cb9b343a8e8468084ba84f2360b70c0b08137f85569c376a0ca45003ce6bc7d
SHA512
ef63dbb3f6447b398f4b2fde20d8c25e51b5e2ecdd95e925350ca0ceeefd9630066fae81fdd3c1911370b56b6ed3b661d46d09d21e0c6b64bfd301d480bd7307
SSDEEP
3072:KqPyXhNvqDt3BFk9uadky5dL2QVBhsNcvdjrG9hOLkn:IXhxqDFBeEa9dLLnhsNcvZrGGLK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
BeginUpdateResourceA
CloseHandle
CompareStringW
CreateFileA
CreateWaitableTimerA
DeleteCriticalSection
DeleteFiber
EnterCriticalSection
EnumDateFormatsW
ExitProcess
FindResourceExA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentVariableW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OpenMutexW
RaiseException
ReadConsoleOutputAttribute
RtlUnwind
SearchPathW
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualFreeEx
VirtualQuery
WideCharToMultiByte
WriteFile
WriteProfileStringW
AbortDoc
AddFontResourceExA
CreateColorSpaceW
CreateDIBPatternBrushPt
EnumThreadWindows
MessageBoxA
wsprintfA
CoFileTimeNow
CoRegisterMallocSpy
CoRegisterPSClsid
CoUnmarshalInterface
GetClassFile
IIDFromString
OleCreateFromFileEx
OleLoad
OleLockRunning
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE