ANdF226J4q
DllRegisterServer
IPa579
OYRCC43y7
PqxLTivB
QEY0Wo7
Overview
overview
10Static
static
456012a585...56.iso
windows7-x64
3456012a585...56.iso
windows10-2004-x64
3Claim_Letter.lnk
windows7-x64
3Claim_Letter.lnk
windows10-2004-x64
3about/myOf.js
windows7-x64
3about/myOf.js
windows10-2004-x64
1about/thereIn.dll
windows7-x64
10about/thereIn.dll
windows10-2004-x64
10about/withIt.bat
windows7-x64
1about/withIt.bat
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Claim_Letter.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Claim_Letter.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
about/myOf.js
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
about/myOf.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
about/thereIn.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
about/thereIn.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
about/withIt.bat
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
about/withIt.bat
Resource
win10v2004-20220901-en
Target
456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56
Size
430KB
MD5
6e2eae735721ceaa59b967810fb5b44f
SHA1
7390800e71325753ae472815e8b5c653a99d6fb1
SHA256
456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56
SHA512
bde0544e0807afe48a97fae13348295b4be1d5d9e59c6c45878c7c1fc997e591ab956ce86a527848d6b43e76d3576fc47ac2a5dc0c6974b0512bc0d7659051be
SSDEEP
6144:eu8T9zrStWm3C3klS1gqbe5L05kVxVFInAPexY5ixyizO8wj+A:J8ZSg24Vbe5LFVxVFIAPWelSZm
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
GetFileSize
WriteFile
CloseHandle
GetLastError
HeapCreate
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
ExitProcess
GetCurrentThread
GetCurrentThreadId
GetSystemDirectoryA
VirtualAlloc
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
CreateFileMappingA
LoadLibraryA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
SetLastError
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetFileAttributesExW
CompareStringW
LCMapStringW
GetStdHandle
GetFileType
GetACP
GetStringTypeW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapSize
HeapReAlloc
DecodePointer
CreateFileW
SetFilePointerEx
WriteConsoleW
ReadFile
ReadConsoleW
RaiseException
ANdF226J4q
DllRegisterServer
IPa579
OYRCC43y7
PqxLTivB
QEY0Wo7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ