CreateReport
EurekaLog_PasswordRequestEvent
ExceptionManager
RunPrint
Run_DesignFrm
Run_DesignFrmGrd
Run_PriveFrm
UpdateRwx
Static task
static1
Behavioral task
behavioral1
Sample
c6df716122a6217f8094c2c0c6f0bdb10ef42a04acfb77907d62fb6c36285d6c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6df716122a6217f8094c2c0c6f0bdb10ef42a04acfb77907d62fb6c36285d6c.dll
Resource
win10v2004-20220812-en
Target
c6df716122a6217f8094c2c0c6f0bdb10ef42a04acfb77907d62fb6c36285d6c
Size
1.5MB
MD5
2b1005e569f276864d2256e42dde1a01
SHA1
ad7db23fdb1ddfface3877cba20717ca00a76c6b
SHA256
c6df716122a6217f8094c2c0c6f0bdb10ef42a04acfb77907d62fb6c36285d6c
SHA512
a58c6df26494f8d22d80b201e0d579628a980aaddd5048fc14101e794d19a90b44c66d2d1e147a8d7dbc75bda9b8971949a321de60c4037f982e2700e5b0c00d
SSDEEP
49152:vQT6AW6sR72YVV6XoDwY93MmjDo7G6oBwB:vQTTW6sRnVDwYxx+G6oBwB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
SysFreeString
VerQueryValueA
UnrealizeObject
IsEqualGUID
ShellExecuteA
WSACleanup
ImageList_Destroy
SetFormA
ChooseFontA
timeGetTime
CreateReport
EurekaLog_PasswordRequestEvent
ExceptionManager
RunPrint
Run_DesignFrm
Run_DesignFrmGrd
Run_PriveFrm
UpdateRwx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE