andcxdh
gvybuttqs
Static task
static1
Behavioral task
behavioral1
Sample
c3989b8cb2ffd3f30cd0f6f08684e2f476ab106770835df37821b1b430fb0795.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c3989b8cb2ffd3f30cd0f6f08684e2f476ab106770835df37821b1b430fb0795.dll
Resource
win10v2004-20221111-en
Target
c3989b8cb2ffd3f30cd0f6f08684e2f476ab106770835df37821b1b430fb0795
Size
96KB
MD5
beb544dec82e998d4b0b1460db097d80
SHA1
0cc229daa97c08e38fc84aee4594431c6ef5ee9b
SHA256
c3989b8cb2ffd3f30cd0f6f08684e2f476ab106770835df37821b1b430fb0795
SHA512
623ed30047fc4170aa104094d57eb88de0f37fa0db27e89b19179fa55c38ab8f874fa514d4312ff8d9caf0bcaafd056256baeceaa1d3233e6d2e19dcbf5d1027
SSDEEP
1536:5kenBa+dPDAhkZ1AmcfoChtlN7V0/mswgCvMafNBrDPlQefrXfu1y:5/FFAaAmJCL/pJgCj7lRrXfm
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ShowScrollBar
RegQueryValueA
andcxdh
gvybuttqs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE