Q1_EXECHECK_INITFUNC
Q1_FREEMEM
Q1_GETMEM
Q1_RUN
Static task
static1
Behavioral task
behavioral1
Sample
b339179b35cce422183b9d75412b85d16ad7393cf894f5c6c1ef55879506eb10.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b339179b35cce422183b9d75412b85d16ad7393cf894f5c6c1ef55879506eb10.dll
Resource
win10v2004-20220812-en
Target
b339179b35cce422183b9d75412b85d16ad7393cf894f5c6c1ef55879506eb10
Size
196KB
MD5
66dfc477b5ac541214b0402728d7844a
SHA1
b1baf0e034c668d2b5655c66e22970719467fe17
SHA256
b339179b35cce422183b9d75412b85d16ad7393cf894f5c6c1ef55879506eb10
SHA512
d3444d9772250667782070aa68c65ce731b7819b0e6ef6d7523eb72ca748f7bc286944a091718c5c47a39c0e432d4dae33d7347b1f35c94930163e5df0264d6d
SSDEEP
6144:xCqGimoupf5IKP8p5LTbgvMsQHoiI469/BrAOq8q:xCqMoim7vXsuIz9aOPq
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
SysFreeString
RegQueryValueExA
GetKeyboardType
@Borlndmm@SysGetMem$qqri
CoUninitialize
SHGetSpecialFolderLocation
Q1_EXECHECK_INITFUNC
Q1_FREEMEM
Q1_GETMEM
Q1_RUN
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE