DllRegisterServer
DllUnregisterServer
exculpatorily
hemophagy
inexpiate
monology
nonsalutation
reattempt
reboisement
strepent
thermopleion
trombonist
Static task
static1
Behavioral task
behavioral1
Sample
VV.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
VV.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
transitoriness/cautions.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
transitoriness/cautions.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
transitoriness/crisping.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
transitoriness/crisping.cmd
Resource
win10v2004-20220901-en
Target
VV2795.iso
Size
872KB
MD5
7e31c028d7cfb020f50636aaad29cc35
SHA1
6519ca16256f67510e4616db5e40ba06360d8dd3
SHA256
0813356c51d9378a310f4b2504950da410d41a863a705c624918e5c32f3b958d
SHA512
9d79f114a047333e8157cd285917bc558ebb0ce85816b95eb06cd94132f215b04b132d3aaaa2b4ea301311adeae27104b3633403836e803ed1c2b7c0094ac537
SSDEEP
24576:nwkUhn/7jAF2XHVRweHHHWFMplHGHBZwQweHHRwAw:nbUhDjAF2XHVRweHHHWFMplHGHBZwQwl
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetSystemDirectoryA
GetModuleHandleW
DebugBreak
WaitForSingleObject
CreateThread
ExitThread
GetTickCount
VirtualAlloc
GetCommandLineA
GetFileAttributesA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
FindNextFileA
GetVersion
GetModuleHandleA
lstrcmpA
lstrcmpiA
lstrlenA
SetEndOfFile
WriteConsoleW
HeapSize
CreateFileW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCurrentThreadId
FindFirstFileA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RaiseException
RtlUnwind
InterlockedFlushSList
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
CloseHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
LoadIconA
PathFindOnPathA
PathFindExtensionA
PathGetDriveNumberA
ord155
StrToIntA
PathAppendA
PathFileExistsA
PathFindSuffixArrayA
DllRegisterServer
DllUnregisterServer
exculpatorily
hemophagy
inexpiate
monology
nonsalutation
reattempt
reboisement
strepent
thermopleion
trombonist
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ