dtugsy
kayacrjp
vpfsih
xjxhukvjm
Static task
static1
Behavioral task
behavioral1
Sample
ad44f24122a74b9ca3007e1ae6cf1db23488a84ba5f13030de8f12b1ae8bd16b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad44f24122a74b9ca3007e1ae6cf1db23488a84ba5f13030de8f12b1ae8bd16b.dll
Resource
win10v2004-20220812-en
Target
ad44f24122a74b9ca3007e1ae6cf1db23488a84ba5f13030de8f12b1ae8bd16b
Size
293KB
MD5
66cc1284fc91edcd34bedc043e5d2af0
SHA1
c2e7753075f4922cbcd2fc623e4a6b5cc3ebd7d6
SHA256
ad44f24122a74b9ca3007e1ae6cf1db23488a84ba5f13030de8f12b1ae8bd16b
SHA512
3572d2bd23162b1ff80d8faf28423f27d7d0273ab7209066ab7c5b021054152f8ee5faeb6112bfa16d49c7b802156832efa4c3c22c9ae3f31365e4d8837732ad
SSDEEP
6144:+krjLVCXjlTAZ2/1Mx2daL4Ik/5hdF86wdjvhCK0n:+E5Czl0qw2aL4NhDwdL8K0n
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
IsCharUpperA
RegOpenKeyExA
dtugsy
kayacrjp
vpfsih
xjxhukvjm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE