AQDockMenuBelow
AQInit
AQSetGraspInfo
EurekaLog_PasswordRequestEvent
ExceptionManager
Static task
static1
Behavioral task
behavioral1
Sample
4133076ebc3bf3b4a8bf0270b3375717de6fd754f8113da059c230c40a8f4440.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4133076ebc3bf3b4a8bf0270b3375717de6fd754f8113da059c230c40a8f4440.dll
Resource
win10v2004-20221111-en
Target
4133076ebc3bf3b4a8bf0270b3375717de6fd754f8113da059c230c40a8f4440
Size
411KB
MD5
e96478d0a9de1e0a4b29f323affe9b05
SHA1
2376d212751869029a2aea357ec02862e37f9a7a
SHA256
4133076ebc3bf3b4a8bf0270b3375717de6fd754f8113da059c230c40a8f4440
SHA512
ac919ed61b3c237f313f2fde9b12eb748861104b8e56e21a93283590fea142a764761ea3e125e9e610446b22d959a94258f8df33c3edbb9bb4f4abba1212f356
SSDEEP
12288:7pRpAgjH4MDsZVRGMBKUCGo0AY58KoEPL9n6N:VRpAgL3s/BKUPAO8EP2
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
SysFreeString
@Borlndmm@SysGetMem$qqri
VerQueryValueA
UnrealizeObject
CoUninitialize
ShellExecuteA
WSACleanup
ImageList_Destroy
AQDockMenuBelow
AQInit
AQSetGraspInfo
EurekaLog_PasswordRequestEvent
ExceptionManager
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE