DllRegisterServer
DllUnregisterServer
exculpatorily
hemophagy
inexpiate
monology
nonsalutation
reattempt
reboisement
strepent
thermopleion
trombonist
Static task
static1
Behavioral task
behavioral1
Sample
VV.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
VV.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
transitoriness/causeways.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
transitoriness/causeways.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
transitoriness/insensibility.dll
Resource
win7-20220901-en
Target
VV9267.iso
Size
872KB
MD5
7c7f7302519ec23faa69aea88a825182
SHA1
20adff022068163d73574b89b5e9af31ca5aec6d
SHA256
3de1e03c8e08664f70265e919d037c7ef692093d4a9c19b098c3bbffc1120b54
SHA512
9141703080ab12569c7de113556c13212c1959e8f2eca72ab951fe6625f14bd5176390d76cafdbfa42d284a38d604a12cb1c8085ab0c52ebeeb88e8195065197
SSDEEP
24576:GHVRweHHHWFMplHGHBZwQweHHRwAw+kkUhn/7jAF2:GHVRweHHHWFMplHGHBZwQweHHRwAw+XS
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetSystemDirectoryA
GetModuleHandleW
DebugBreak
WaitForSingleObject
CreateThread
ExitThread
GetTickCount
VirtualAlloc
GetCommandLineA
GetFileAttributesA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
FindNextFileA
GetVersion
GetModuleHandleA
lstrcmpA
lstrcmpiA
lstrlenA
SetEndOfFile
WriteConsoleW
HeapSize
CreateFileW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCurrentThreadId
FindFirstFileA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RaiseException
RtlUnwind
InterlockedFlushSList
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
CloseHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
LoadIconA
PathFindOnPathA
PathFindExtensionA
PathGetDriveNumberA
ord155
StrToIntA
PathAppendA
PathFileExistsA
PathFindSuffixArrayA
DllRegisterServer
DllUnregisterServer
exculpatorily
hemophagy
inexpiate
monology
nonsalutation
reattempt
reboisement
strepent
thermopleion
trombonist
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ