Scan Result:
                procexp.exe
            
            Sample Information
| SHA256 | |
| Sample Name | |
| File Size | 
                     4.3 MB 4531120 Bytes  | 
            
| First Seen | 
                     2024-11-21 06:14 UTC+0000 11 months, 1 week ago.  | 
            
General
| MIME Type | |
| MD5 Hash | |
| Architecture | x86 (PE32) | 
| Compile Time | 
                                                
                                                    
                                                         2024-05-28 03:50 1 year, 5 months ago.  | 
                                        
| Image Base | 
                                                
                                                    0x400000
                                                
                                             | 
                                        
| Entry Point | 
                                                
                                                    0xc43ce
                                                
                                             | 
                                        
PEID Signatures
VC8_Microsoft_CorporationMicrosoft_Visual_Cpp_8
File Meta Data
| Company Name | |
| File Description | |
| File Version | |
| Internal Name | |
| Legal Copyright | |
| Original Filename | |
| Product Name | |
| Product Version | 
Important Imports
- UnhookWindowsHookEx
 - CallNextHookEx
 - OpenProcessToken
 - IsDebuggerPresent
 - NtQueryInformationProcess
 - VirtualAlloc
 - CreateProcessW
 - OpenThread
 - ResumeThread
 - OpenProcess
 - CreateToolhelp32Snapshot
 - Thread32First
 - Thread32Next
 - GetDesktopWindow
 - RegSetValueExW
 - RegConnectRegistryW
 - RegEnumKeyExW
 - RegLoadKeyW
 - AdjustTokenPrivileges
 - RegOpenKeyExW
 - RegQueryInfoKeyW
 - RegQueryValueExW
 - RegEnumValueW
 - RegCreateKeyExW
 - ReadProcessMemory
 - HeapAlloc
 - FindResourceW
 - UnhandledExceptionFilter
 - VirtualQuery
 - VirtualQueryEx
 - GetTickCount
 - GetProcAddress
 
Matching Rules
| Rule Name | Rule Type | 
|---|---|
| YARA_QEMU_REGISTRY | YARA | 
| YARA_disable_process | YARA | 
| YARA_Findcrypt | YARA | 
| YARA_VBOX_REGISTRY | YARA | 
| YARA_DetectParentProcess | YARA | 
| YARA_XOR_Hunt | YARA | 
Matching Techniques
| Technique Name | Technique ID's | Snippet(s) | Rules(s) | OS | 
|---|---|---|---|---|
| Detecting Virtual Environment Artefacts | U1332 | |||
| Kill Process | U0403 | |||
| Cryptography | U0703 E1027.m04 | |||
| Wiping or Encrypting | U0301 | |||
| Parent Process Detection | U0404 | |||
| XOR Operation | U0701 E1027.m02 |