AQDockMenuBelow
AQInit
AQSetGraspInfo
EurekaLog_PasswordRequestEvent
ExceptionManager
Static task
static1
Behavioral task
behavioral1
Sample
08bf55adde9e24d8a1a91be630acde16366972e2ab8779da9236967b644bbac5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
08bf55adde9e24d8a1a91be630acde16366972e2ab8779da9236967b644bbac5.dll
Resource
win10v2004-20220812-en
Target
08bf55adde9e24d8a1a91be630acde16366972e2ab8779da9236967b644bbac5
Size
411KB
MD5
2d6d0a476e447f58a4bf1ee33d56349e
SHA1
ad60b789d4652ac53df5a3357cc281a96dfd6a86
SHA256
08bf55adde9e24d8a1a91be630acde16366972e2ab8779da9236967b644bbac5
SHA512
0df64efc6a3a939570363fc7eec872f1221bd35e4714843ee930d6cb097dabd3086ffa6a237147b8e69738ad6b517977260c4335e059fd3c3d3f1aef300e325c
SSDEEP
12288:jpRpAgjH4MDsZVRGMBKUCGo0AY58KoEPL9n6N:dRpAgL3s/BKUPAO8EP2
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
SysFreeString
@Borlndmm@SysGetMem$qqri
VerQueryValueA
UnrealizeObject
CoUninitialize
ShellExecuteA
WSACleanup
ImageList_Destroy
AQDockMenuBelow
AQInit
AQSetGraspInfo
EurekaLog_PasswordRequestEvent
ExceptionManager
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE