DllRegisterServer
DllUnregisterServer
abuzz
bartramiaceae
bockerel
derivation
dubiety
geothermometer
helodermatoid
spermatozoa
strontic
unprophetical
virgula
xylocarpous
Overview
overview
10Static
static
d920bc4467...55.iso
windows7-x64
3d920bc4467...55.iso
windows10-2004-x64
3GalleryA.lnk
windows7-x64
3GalleryA.lnk
windows10-2004-x64
3mesenteric...es.cmd
windows7-x64
1mesenteric...es.cmd
windows10-2004-x64
1mesenteric...lse.js
windows7-x64
3mesenteric...lse.js
windows10-2004-x64
1mesenteric...ed.jpg
windows7-x64
3mesenteric...ed.jpg
windows10-2004-x64
3mesenteric...ly.dll
windows7-x64
10mesenteric...ly.dll
windows10-2004-x64
10Static task
static1
Behavioral task
behavioral1
Sample
d920bc4467d6a74498b70669343bb2844f052600d80528a9e8f32a3e5cf80155.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d920bc4467d6a74498b70669343bb2844f052600d80528a9e8f32a3e5cf80155.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
GalleryA.lnk
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
GalleryA.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
mesenteric/fungicidesDroves.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
mesenteric/fungicidesDroves.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
mesenteric/happenImpulse.js
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
mesenteric/happenImpulse.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
mesenteric/italicized.jpg
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
mesenteric/italicized.jpg
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
mesenteric/triumphantly.dll
Resource
win7-20220812-en
Target
d920bc4467d6a74498b70669343bb2844f052600d80528a9e8f32a3e5cf80155
Size
594KB
MD5
c814f21f27a168ff6da951f303f57fc6
SHA1
44eadb517e5ede62c38bf69acf5040d1b9ac59d2
SHA256
d920bc4467d6a74498b70669343bb2844f052600d80528a9e8f32a3e5cf80155
SHA512
5291cc55e4cedefcf2f11d515b20ed607879cb9c3046db23b3609646f271738ce92c473c93ce6ebdddbe94f8d4a87a1b6d3e2181fe63dd03c830e89544942289
SSDEEP
12288:PIfZT+70QjX8aSIUXg69IkwISg9Wd5aG:QhE9jX8zJIkwY9PG
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sleep
DebugBreak
GetCommandLineW
lstrlenA
GetCurrentThreadId
VirtualAlloc
GetModuleHandleA
GetVersion
GetFileAttributesA
GetCurrentThread
GetCurrentProcessId
GetModuleHandleW
CreateFileW
GetFileSize
CloseHandle
CreateFileA
LocalAlloc
GetModuleFileNameA
lstrcmpA
ReadFile
GetConsoleMode
GetConsoleOutputCP
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
GetStdHandle
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
MoveFileExW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetFilePointerEx
SetStdHandle
HeapSize
FlushFileBuffers
WriteFile
WriteConsoleW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
ord155
PathGetDriveNumberA
StrToIntA
DllRegisterServer
DllUnregisterServer
abuzz
bartramiaceae
bockerel
derivation
dubiety
geothermometer
helodermatoid
spermatozoa
strontic
unprophetical
virgula
xylocarpous
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ