CreateShortcut
ResolveShortcut
SmadAddVBU
SmadCountDB
SmadDateDB
SmadEnumDB
SmadFileChecksum
SmadFileInfo
SmadInitDB
SmadProcessOwner
SmadRemoveVBU
SmadScanFile
SmadVersion
SuperKill
Static task
static1
Behavioral task
behavioral1
Sample
6c52948c197d96c5f005af393e8056c2c1664fd56eb098a8cff071594f9003eb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c52948c197d96c5f005af393e8056c2c1664fd56eb098a8cff071594f9003eb.dll
Resource
win10v2004-20220812-en
Target
6c52948c197d96c5f005af393e8056c2c1664fd56eb098a8cff071594f9003eb
Size
215KB
MD5
0316821be2a8e47d940d6dd1e24b5ce0
SHA1
6488cb3c2e24b9a9b7d1154609118301e1808dd8
SHA256
6c52948c197d96c5f005af393e8056c2c1664fd56eb098a8cff071594f9003eb
SHA512
4b06360d810c39f7a6202b9d3036288ad9b34f227ff4b2ba16d8855b0e53fdc4917c9d2bbfed44dac7b1edee663e7821a5856cbc77c95b37a3e7b2a09d81876b
SSDEEP
6144:nmSkWM8EmuTqDYvNLCnwGTEDqV3rQ9uf9lKP8b/s:ndMzmuTqDoLaP3rke9G8Ds
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetDriveTypeW
IsBadReadPtr
GetFileAttributesW
ReadFile
CreateFileMappingW
OpenProcess
LoadLibraryW
GetLastError
GetProcAddress
UnmapViewOfFile
FlushFileBuffers
CreateFileA
GetLocaleInfoA
MapViewOfFile
SetFilePointer
GetFileSize
CloseHandle
OutputDebugStringA
GetTempPathW
CreateFileW
GetModuleFileNameW
InterlockedIncrement
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
RaiseException
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetModuleHandleA
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SendMessageW
GetDC
DrawIconEx
FindWindowW
FindWindowExW
ReleaseDC
DestroyIcon
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetPixel
CreateSolidBrush
PatBlt
GetTokenInformation
OpenProcessToken
LookupAccountSidW
ExtractIconExW
CoCreateInstance
CreateShortcut
ResolveShortcut
SmadAddVBU
SmadCountDB
SmadDateDB
SmadEnumDB
SmadFileChecksum
SmadFileInfo
SmadInitDB
SmadProcessOwner
SmadRemoveVBU
SmadScanFile
SmadVersion
SuperKill
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE