dtugsy
kayacrjp
vpfsih
xjxhukvjm
Static task
static1
Behavioral task
behavioral1
Sample
947b9522222b3ea9254b149f3b3b74651f6eb14a572429e72f2092b4ae9de0fa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
947b9522222b3ea9254b149f3b3b74651f6eb14a572429e72f2092b4ae9de0fa.dll
Resource
win10v2004-20220812-en
Target
947b9522222b3ea9254b149f3b3b74651f6eb14a572429e72f2092b4ae9de0fa
Size
88KB
MD5
9d16cbfab278d3076a7a74dabf73b610
SHA1
0c2a6da7b114c552620d36b25b6122f4962b0e8d
SHA256
947b9522222b3ea9254b149f3b3b74651f6eb14a572429e72f2092b4ae9de0fa
SHA512
488408175ee4c2722f669feaf3673e86cbcadce372fa0a8ee431a7fcb5b5cb506390f76d76db07e4d2f544ae9ceb09e70a758cb08036b960afe7687a71390a9d
SSDEEP
1536:htu+/3Gi0Tg3wsufzRqJLegAXNq719y9al8z4LtctDT0f1liYh:7GdT4wvfzoL9AA7e9aMswDT0f1cYh
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
IsCharUpperA
RegOpenKeyExA
dtugsy
kayacrjp
vpfsih
xjxhukvjm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE