andcxdh
gvybuttqs
Static task
static1
Behavioral task
behavioral1
Sample
930315acabade1889d1e66fa7c2cc36c4f934bc7d69216b41db3d6eb8090d899.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
930315acabade1889d1e66fa7c2cc36c4f934bc7d69216b41db3d6eb8090d899.dll
Resource
win10v2004-20220812-en
Target
930315acabade1889d1e66fa7c2cc36c4f934bc7d69216b41db3d6eb8090d899
Size
87KB
MD5
220799f82a70b8f9d0be314efe51d7eb
SHA1
6f8add6bc98be4f0a154debd049b0f793ff10754
SHA256
930315acabade1889d1e66fa7c2cc36c4f934bc7d69216b41db3d6eb8090d899
SHA512
a15057e78015bda39fc7d8dbb8d594206c3be8be553885ee322f57b8041f1c280028df2a4e1f3f83a0f2de2466a5214a2c29ea1c28bfa7972eb023a05aff3881
SSDEEP
1536:TM8giR8xjGoUhfvUgonKLoMzuGu4wnjIbGTUSMBG1slhQfeAoR79IpWJpQn:Y48phPObuxnaGTUSE7CC7S2pQn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ShowScrollBar
RegQueryValueA
andcxdh
gvybuttqs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE