dtugsy
kayacrjp
vpfsih
xjxhukvjm
Static task
static1
Behavioral task
behavioral1
Sample
c557092e6c9f810770b613ff0ee9320635470b235610c0e9693b20deca3f3383.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c557092e6c9f810770b613ff0ee9320635470b235610c0e9693b20deca3f3383.dll
Resource
win10v2004-20220812-en
Target
c557092e6c9f810770b613ff0ee9320635470b235610c0e9693b20deca3f3383
Size
297KB
MD5
b1966770dc95562202a79249cefbf40d
SHA1
c56ad33c52d9b3a1bb3d44af48464c8920847125
SHA256
c557092e6c9f810770b613ff0ee9320635470b235610c0e9693b20deca3f3383
SHA512
9aa6ad5364844c53da367daa74ef8924b59e1cc9a338cdc21510fa529e36e00790d8d6db7cc867dd9bc55ad6c14a5e3f676adb741f93f37be10d17182b0b3c78
SSDEEP
6144:xkrjLVCXjlTAZ2/1Mx2daL4Ik/5hdF86wdjvhCK0:xE5Czl0qw2aL4NhDwdL8K0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
IsCharUpperA
RegOpenKeyExA
dtugsy
kayacrjp
vpfsih
xjxhukvjm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE