CreateShortcut
ResolveShortcut
SmadAddVBU
SmadCountDB
SmadEnumDB
SmadFileChecksum
SmadInitDB
SmadRemoveVBU
SmadScanFile
SuperKill
Static task
static1
Behavioral task
behavioral1
Sample
f7cae8ff9257a01358019ba2ddae3769da03eb3246c6288608f9d56a8cbd461b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7cae8ff9257a01358019ba2ddae3769da03eb3246c6288608f9d56a8cbd461b.dll
Resource
win10v2004-20220812-en
Target
f7cae8ff9257a01358019ba2ddae3769da03eb3246c6288608f9d56a8cbd461b
Size
162KB
MD5
4c0ffc1550bf3235a3a84c8906063e03
SHA1
29150c8d77093917389a7769f401c8950eedbac4
SHA256
f7cae8ff9257a01358019ba2ddae3769da03eb3246c6288608f9d56a8cbd461b
SHA512
626c8fc23f6052518c6151f7b7ae76ebe322bb877aea1854704cd832756bee22be4770f24f44111d1a1586a1cee6620c14934eb2294cfeddde3e73ad33992430
SSDEEP
3072:EbbpXf8f7xDpRWQNcX09l57bRE4m3rJr9HftXdbxuj1wGM1WHH:mbpXf8fNDTiY8Jr9H1XdbEcWHH
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetFileSize
SetFilePointer
MapViewOfFile
UnmapViewOfFile
IsBadReadPtr
CopyFileW
ReadFile
CreateFileMappingW
DeleteFileW
OutputDebugStringA
OpenProcess
CloseHandle
GetProcAddress
FlushFileBuffers
CreateFileA
GetLocaleInfoA
GetTempPathW
CreateFileW
GetModuleFileNameW
GetSystemDirectoryW
LoadLibraryW
SetLastError
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
HeapAlloc
RaiseException
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleA
InterlockedDecrement
Sleep
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetDC
DrawIconEx
ReleaseDC
DestroyIcon
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetPixel
CreateSolidBrush
PatBlt
ExtractIconExW
CoCreateInstance
CreateShortcut
ResolveShortcut
SmadAddVBU
SmadCountDB
SmadEnumDB
SmadFileChecksum
SmadInitDB
SmadRemoveVBU
SmadScanFile
SuperKill
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE