andcxdh
gvybuttqs
Static task
static1
Behavioral task
behavioral1
Sample
f5956a7c3a7e24903ed4721941aa00c5e4241a3301eb3464e38b230bb537da23.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f5956a7c3a7e24903ed4721941aa00c5e4241a3301eb3464e38b230bb537da23.dll
Resource
win10v2004-20220812-en
Target
f5956a7c3a7e24903ed4721941aa00c5e4241a3301eb3464e38b230bb537da23
Size
91KB
MD5
b4b95a994c86818567bec9b0a72bdeaf
SHA1
4e19db7d6bcda06d50cfef10fe6bb88b8fcfc4c0
SHA256
f5956a7c3a7e24903ed4721941aa00c5e4241a3301eb3464e38b230bb537da23
SHA512
a0199a88462b1bf369642db8dc30efd0762facf43d7c772297fbdfbb6bf100aeeb8ad68763563d75ef608066717a1f6f3da9837ff80257cfcf0ccd5a34b1f25f
SSDEEP
1536:/M8giR8xjGoUhfvUgonKLoMzuGu4wnjIbGTUSMBG1slhQfeAoR79IpWJpQL1y:U48phPObuxnaGTUSE7CC7S2pQZ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ShowScrollBar
RegQueryValueA
andcxdh
gvybuttqs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE