DllRegisterServer
DllUnregisterServer
broadbill
clite
enlargeableness
lipped
monotheist
pharyngemphraxis
platypod
pretonic
scribbleomania
subjectibility
unturpentined
Overview
overview
10Static
static
ContractCopy_RL43.iso
windows7-x64
3ContractCopy_RL43.iso
windows10-2004-x64
3ContractCopy.js
windows7-x64
10ContractCopy.js
windows10-2004-x64
10addled/desertions.dll
windows7-x64
10addled/desertions.dll
windows10-2004-x64
10addled/petrifies.png
windows7-x64
3addled/petrifies.png
windows10-2004-x64
3addled/squawked.png
windows7-x64
3addled/squawked.png
windows10-2004-x64
3addled/volcanic.txt
windows7-x64
1addled/volcanic.txt
windows10-2004-x64
1data.txt
windows7-x64
1data.txt
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
ContractCopy_RL43.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ContractCopy_RL43.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
ContractCopy.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ContractCopy.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
addled/desertions.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
addled/desertions.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
addled/petrifies.png
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
addled/petrifies.png
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
addled/squawked.png
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
addled/squawked.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
addled/volcanic.txt
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
addled/volcanic.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
data.txt
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
data.txt
Resource
win10v2004-20221111-en
Target
EzrnVmjeEFCe8dchBuBQCPw-vIdkovWcsKXpj5TYN2k.bin
Size
474KB
MD5
af9daf97558368fc9a29b8ab11c39a4e
SHA1
e043026bff7c45ffd1aafc6162f477ba26898e70
SHA256
133ae75668de10509ef1d72106e05008fc3fbc8764a2f59cb0a5e98f94d83769
SHA512
9e30bdbdf9c7dc9377b3ceada8d5be4443c1538e0c7e0e0bd3f3e7d8302d98ddcb311b8e3faaf9b2d60bc3e70305291fd47675dcb9872812c6f9ec7184c8ec78
SSDEEP
12288:hpPNzvq7gRQ6I5hDH0IpzE1fV00TCTeuXdNsnM0+1pQL:htNzvIUIpzKfV7CVd+LbL
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
WaitForSingleObject
CreateThread
GetTickCount64
VirtualAllocEx
GetCommandLineA
GetFileAttributesA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetTickCount
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
LocalAlloc
MulDiv
lstrcmpA
lstrcmpiA
lstrlenA
GetPrivateProfileIntA
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RaiseException
RtlUnwind
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
MultiByteToWideChar
LCMapStringW
MoveFileExW
DecodePointer
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetStdHandle
WriteConsoleW
FindWindowA
SetTimer
EndDialog
DialogBoxParamA
IsWindowVisible
ScreenToClient
GetDC
PathFindOnPathA
PathGetDriveNumberA
PathFileExistsA
ord155
StrToIntA
PathFindExtensionA
PathFindSuffixArrayA
DllRegisterServer
DllUnregisterServer
broadbill
clite
enlargeableness
lipped
monotheist
pharyngemphraxis
platypod
pretonic
scribbleomania
subjectibility
unturpentined
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ