ALUa7
DrawThemeIcon
PHYST2JX3
UYh41ub
Vemfa4WN
Static task
static1
Behavioral task
behavioral1
Sample
liqueurs.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
liqueurs.dll
Resource
win10v2004-20221111-en
Target
liqueurs.tmp
Size
599KB
MD5
2d16cc9fd51c05f2ef2d250dd93747c2
SHA1
b9fa438a4a70f2b2cb8d151a20dec23e2e58ff5e
SHA256
59cef35b45f15a8a518a2a24e96bfc60845071815393788f6c39df7b0d7fd33b
SHA512
3a42a236e3c15995f656ff8a00172b3acd75bcf9f46282d270b0f5f057ef32e47ed1ee86ab9d766a5eb2e646b61ec2dfda5a8d72c6608405ab3349c263bf898e
SSDEEP
12288:8PZ0mBHmmHD/cJminEGEY7+wO/49T3/lSAH:u0mHRHr/0xH
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateFileA
CreateFileMappingA
CreateFileW
CreateNamedPipeA
CreateThread
DecodePointer
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindFirstFileExW
FindNextFileA
FindNextFileW
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetComputerNameA
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedFlushSList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
MapViewOfFile
MultiByteToWideChar
OpenThread
QueryPerformanceCounter
RaiseException
ResumeThread
RtlUnwind
SetFileAttributesA
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
WaitNamedPipeA
WideCharToMultiByte
WriteConsoleW
WriteFile
ALUa7
DrawThemeIcon
PHYST2JX3
UYh41ub
Vemfa4WN
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ