dobijukoru
eqotufin
isaparizolo
megexufabec
palise
semidaku
uxarewun
uyicorunuf
varujemipa
Static task
static1
Behavioral task
behavioral1
Sample
9488fa5582fabcff8236cf4e94cdc6616ea0c7d4219e1079aed31d0738051311.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9488fa5582fabcff8236cf4e94cdc6616ea0c7d4219e1079aed31d0738051311.dll
Resource
win10v2004-20221111-en
Target
9488fa5582fabcff8236cf4e94cdc6616ea0c7d4219e1079aed31d0738051311
Size
868KB
MD5
111e5bb03bd3587dd217a78bf7fac420
SHA1
4d29554b7f17afb9e7c9a902df9a4803dc55d696
SHA256
9488fa5582fabcff8236cf4e94cdc6616ea0c7d4219e1079aed31d0738051311
SHA512
500a6bfd2c12995f813f6a26111f2a82b10fa16bc8de38c239c177d3bc4755f8c7d94ce4ebc3f622c9bcdde710fc6d7318897482ffe6c41d226142a4945b48c6
SSDEEP
12288:Ca9DEf5Y1DnJV/AkvYmOGbUoePpPlyn+XzL1bGl+kiDC9xx:CaORyNXbwh9y+Xf1pkUcH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
ExitProcess
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
RtlUnwind
InterlockedExchange
VirtualQuery
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
GetFocus
dobijukoru
eqotufin
isaparizolo
megexufabec
palise
semidaku
uxarewun
uyicorunuf
varujemipa
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ