@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
61b85f2fa437732c884ac11e508bbe3728210012d09fa9e0ad7ec8e54f811854.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
61b85f2fa437732c884ac11e508bbe3728210012d09fa9e0ad7ec8e54f811854.exe
Resource
win10v2004-20220812-en
Target
61b85f2fa437732c884ac11e508bbe3728210012d09fa9e0ad7ec8e54f811854
Size
2.2MB
MD5
8fcbf35ae5384973d8a55da8b3bcc6e1
SHA1
443f51cf9db76d1e8eb80abb02a2b94bc78191ce
SHA256
61b85f2fa437732c884ac11e508bbe3728210012d09fa9e0ad7ec8e54f811854
SHA512
8361fedabc735443c1bfe6bb29e63cb3ca13cfc5feddae142d8bc6e883fcad2a26f0bbd6753bb394ac517eb324b4d088f50009cd0dac26d1cca6749225d4eb4d
SSDEEP
49152:gb2br8GH3ZBUkQT2wiAXCw2AzaoJVNYyrsZXzq4/57/yh:xRHopTfXz5zasMyrsBryh
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
DeregisterEventSource
CloseHandle
Netbios
BitBlt
EnumThreadWindows
strncpy
GetInterfaceInfo
GetMappedFileNameW
SHGetFolderPathW
@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ