AQDockMenuBelow
AQInit
AQSetGraspInfo
EurekaLog_PasswordRequestEvent
ExceptionManager
Static task
static1
Behavioral task
behavioral1
Sample
86015a0cc011b71af828a10f7f3203bd6aa2b013b23b518d4e59bf97cc1c1ce8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86015a0cc011b71af828a10f7f3203bd6aa2b013b23b518d4e59bf97cc1c1ce8.dll
Resource
win10v2004-20220812-en
Target
86015a0cc011b71af828a10f7f3203bd6aa2b013b23b518d4e59bf97cc1c1ce8
Size
412KB
MD5
64e73e6053eb81b64d88a3de13527631
SHA1
52f64b366ad46965b68067e58ca962bdee6a23b2
SHA256
86015a0cc011b71af828a10f7f3203bd6aa2b013b23b518d4e59bf97cc1c1ce8
SHA512
08629c3bedaac836f9e350fd692f13cb5569c73b2effe5b53f666218557fc0596e6ddd83192afd229bc2ccd0153a5280b8ce656180a00def8fee4bce3b7bef9c
SSDEEP
12288:Yf9z2kxU5Np0/j2ZUt909QubJYm4c+WCqR:YFyiU5Np0X0fbym4c5
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
SysFreeString
@Borlndmm@SysGetMem$qqri
VerQueryValueA
UnrealizeObject
CoUninitialize
ShellExecuteA
WSACleanup
ImageList_Destroy
AQDockMenuBelow
AQInit
AQSetGraspInfo
EurekaLog_PasswordRequestEvent
ExceptionManager
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE