@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
0cb06a5a14f4f29c75cd6b11f683cb5de8eb33da1a156178ca12464fd67a39ce.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0cb06a5a14f4f29c75cd6b11f683cb5de8eb33da1a156178ca12464fd67a39ce.exe
Resource
win10v2004-20230220-en
Target
0cb06a5a14f4f29c75cd6b11f683cb5de8eb33da1a156178ca12464fd67a39ce
Size
2.5MB
MD5
7f2b6ee04ef28cca1c5164a24320346e
SHA1
7b7c3f7cdd12a4e29d3f58acb4cf3f0b7ed06608
SHA256
0cb06a5a14f4f29c75cd6b11f683cb5de8eb33da1a156178ca12464fd67a39ce
SHA512
2077ada0221c352036f0013a95c540ef61061a068ca4e90771fd2ea31685122aaf739da9823ace69cfd527091bc3c3ebfa5dda6d4d78f9b0b8adefc68ccdbcf0
SSDEEP
49152:OocNreHFl53/4uB6Qp4Xhx6hoac34X4A3L/JF:Oo2reHFl53kQp4XhZPoXzL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
CloseHandle
CreateFileA
CreateFileW
CreateProcessA
CreateSemaphoreA
ExitProcess
FindResourceA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetSystemInfo
GetTempPathA
GetTimeZoneInformation
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
IsBadReadPtr
LCMapStringA
LoadLibraryA
LoadLibraryExA
LoadResource
LockResource
OpenProcess
RaiseException
ReadFile
ReleaseSemaphore
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SizeofResource
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WriteFile
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
EnumThreadWindows
MessageBoxA
wsprintfA
@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ