@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
8b65965d4052aa60f3acc3bd696d5d74709f32089cff6cf7de0c2fed120a4c79.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b65965d4052aa60f3acc3bd696d5d74709f32089cff6cf7de0c2fed120a4c79.exe
Resource
win10v2004-20220812-en
Target
8b65965d4052aa60f3acc3bd696d5d74709f32089cff6cf7de0c2fed120a4c79
Size
2.8MB
MD5
c20f9dcbcf9fac8f53441980eb2dffc9
SHA1
f22364723c035da6a417d9af9a76aa4d4120a40e
SHA256
8b65965d4052aa60f3acc3bd696d5d74709f32089cff6cf7de0c2fed120a4c79
SHA512
2f7295335022ff1f7d5b49f9189ce55b3c12d1df4db3c34d8ad1cd58dc53327d4b555106906cf8f34495bb7acf9c50031444a6c59996e7d8200cd875df3698a1
SSDEEP
49152:6hp88BkRDVDZxeGtx7uCYBQxjTatu2wAtRmN1dU2y8:kdYKGtxvcQpKRz8
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
DeregisterEventSource
CloseHandle
Netbios
BitBlt
EnumThreadWindows
strncpy
GetInterfaceInfo
GetMappedFileNameW
SHGetFolderPathW
@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ