andcxdh
gvybuttqs
Static task
static1
Behavioral task
behavioral1
Sample
c6d003f36afca73a5ef245a6855111b11eae358bf389e08f71d1206abc56e46a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6d003f36afca73a5ef245a6855111b11eae358bf389e08f71d1206abc56e46a.dll
Resource
win10v2004-20220812-en
Target
c6d003f36afca73a5ef245a6855111b11eae358bf389e08f71d1206abc56e46a
Size
125KB
MD5
671605338538e706984adef951e81a98
SHA1
aa35f82539d750c16bfe3693de8a614ed44c34e9
SHA256
c6d003f36afca73a5ef245a6855111b11eae358bf389e08f71d1206abc56e46a
SHA512
23df6251f81448fbed9459be0934f8c6df9b49a770aa4de76e900fa692988ba36c4ba81e1e624134557818b43b0548039b359c9179a2cec8fc5ca9239096ce75
SSDEEP
3072:U714uoiYvhrE1Tvz5yitt6iXxVqkqrzoz2qdI48Rx2Gn5SV:M4uoiYvhrqvdy6LqxzQ69Q
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ShowScrollBar
RegQueryValueA
andcxdh
gvybuttqs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE