andcxdh
gvybuttqs
Static task
static1
Behavioral task
behavioral1
Sample
130331564f030e90578c8846fe1668d2c180ecb5085559afc0b7c606b52898c6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
130331564f030e90578c8846fe1668d2c180ecb5085559afc0b7c606b52898c6.dll
Resource
win10v2004-20220812-en
Target
130331564f030e90578c8846fe1668d2c180ecb5085559afc0b7c606b52898c6
Size
129KB
MD5
302920504102c59a5a0c43d8ce181e4f
SHA1
feab7c7e3752a3604d96443daf38458185898c2e
SHA256
130331564f030e90578c8846fe1668d2c180ecb5085559afc0b7c606b52898c6
SHA512
384548084ac9ac33ef0335d45c0481999a8c3e97b56c0382f5e6b9a7d79f9762025c51f2e34fae3555c4c0f41bf17e0772fb199208a4656dfcdf933408bfb887
SSDEEP
3072:D714uoiYvhrE1Tvz5yitt6iXxVqkqrzoz2qdI48Rx2Gn5S1:94uoiYvhrqvdy6LqxzQ69
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ShowScrollBar
RegQueryValueA
andcxdh
gvybuttqs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE