dtugsy
kayacrjp
vpfsih
xjxhukvjm
Static task
static1
Behavioral task
behavioral1
Sample
ebe619daaa6b3ea6055da646ab71d7e836024815a3df993d1b58e384acd75e5d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ebe619daaa6b3ea6055da646ab71d7e836024815a3df993d1b58e384acd75e5d.dll
Resource
win10v2004-20221111-en
Target
ebe619daaa6b3ea6055da646ab71d7e836024815a3df993d1b58e384acd75e5d
Size
652KB
MD5
2c3de22952009a48fb00d9c43736bcf0
SHA1
941b2679125ab1599bf266f48f3ce6cefba4c7b0
SHA256
ebe619daaa6b3ea6055da646ab71d7e836024815a3df993d1b58e384acd75e5d
SHA512
aada62a7c7ad53b1fa3bba30572d8063e3556dae2ff19c9a22e93d3fb95a1f8f0959e6aff20253d73bfdde8dea8e6dcf57b64133269b8e69121e786da629729a
SSDEEP
6144:xEMfkdQXtYIhMJM7pMVwu3f20ZNYYuqiWxY11V:xEMfkRIhMJMQ3fNcIxY1H
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
EnterCriticalSection
GetSystemTime
GetSystemTimeAsFileTime
GetTimeFormatA
RtlUnwind
lstrcmpA
lstrcpynA
IsCharUpperA
EqualRect
DestroyCursor
RegOpenKeyExA
RegLoadKeyA
RegCloseKey
dtugsy
kayacrjp
vpfsih
xjxhukvjm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE