@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
1066832fb2b54f4db7d946b04eff72f631fbd958b5bcee9aaab8e0f9e1221302.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1066832fb2b54f4db7d946b04eff72f631fbd958b5bcee9aaab8e0f9e1221302.exe
Resource
win10v2004-20220812-en
Target
1066832fb2b54f4db7d946b04eff72f631fbd958b5bcee9aaab8e0f9e1221302
Size
2.8MB
MD5
3985ecad52dd2ab1b21944a56135b1d7
SHA1
8cfe272d326a6767664c75cde51ff70f45b7514f
SHA256
1066832fb2b54f4db7d946b04eff72f631fbd958b5bcee9aaab8e0f9e1221302
SHA512
e38c141ce65b8903b2bb68153478ddc49b6af325f437ea341becf3ba36810c1e5bf4235516803057371feab637a3cbd53db0b3973f452e7947a6a917d0d9fefe
SSDEEP
49152:bKfDJNYsl8UwJOUYfMM8BRAM7V73TXksOzmiLYpChJ++1E2vKw:OfDJNYsGUDvMM8rAM7V73zkLmiUmdZ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
DeregisterEventSource
CloseHandle
Netbios
BitBlt
EnumThreadWindows
strncpy
GetInterfaceInfo
GetMappedFileNameW
SHGetFolderPathW
@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ