DllUnregisterServer
DrawThemeIcon
barmskin
hemocyte
ilicaceae
inapostate
periodontologist
pigweed
postern
pugnaciousness
trichosanthes
Overview
overview
7Static
static
document_Y...22.iso
windows7-x64
3document_Y...22.iso
windows10-2004-x64
3data.txt
windows7-x64
1data.txt
windows10-2004-x64
1document.vbs
windows7-x64
3document.vbs
windows10-2004-x64
7overhauled/dozens.gif
windows7-x64
1overhauled/dozens.gif
windows10-2004-x64
1overhauled...ry.dll
windows7-x64
1overhauled...ry.dll
windows10-2004-x64
1overhauled...ss.png
windows7-x64
3overhauled...ss.png
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
document_Y265_Nov#22.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
document_Y265_Nov#22.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
data.txt
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
data.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
document.vbs
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
document.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
overhauled/dozens.gif
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
overhauled/dozens.gif
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
overhauled/honorary.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
overhauled/honorary.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
overhauled/superlativeness.png
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
overhauled/superlativeness.png
Resource
win10v2004-20221111-en
Target
document_Y265_Nov#22.iso
Size
1.2MB
MD5
d782ce153ee4ff3e2e923e59490f30d6
SHA1
1d91a7c75acd202ecf89bd001660885b99c37b98
SHA256
9f732f21cd6bea13a4dbabbf90aa687cafd5b4b530ec27066152479e37f4cec8
SHA512
eb3796e5030727b1859cd4bf949d45aa24cc6c2516a50ae1dc21e65c72bfaf7af77760d2fdaf0d7bf18766df88885c31e66b7987be1f085dc83f501c7ea9088b
SSDEEP
24576:vtE8Z3shoA9qB8DvUAZkl9iIDIQIFaOGYnknF6:e8vmqB8DUAZklKxnknF6
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateDirectoryA
CreateDirectoryW
CreateFileA
CreateFileW
FileTimeToLocalFileTime
FindFirstFileA
FindFirstFileW
FindNextChangeNotification
GetDriveTypeA
GetDriveTypeW
GetFileAttributesA
GetFileAttributesW
GetFileInformationByHandle
GetFullPathNameW
GetFullPathNameA
GetLogicalDriveStringsW
LocalFileTimeToFileTime
LockFile
SetFileAttributesA
SetFileAttributesW
SetUnhandledExceptionFilter
SetErrorMode
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
QueryPerformanceCounter
QueryPerformanceFrequency
DeviceIoControl
LeaveCriticalSection
ReleaseMutex
OpenMutexW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsFree
GetThreadContext
GetSystemInfo
GetLocalTime
GetVersion
SetLocalTime
GetTickCount
GetSystemDirectoryA
GetSystemDirectoryW
GetWindowsDirectoryA
GetWindowsDirectoryW
SetSystemTime
VirtualProtect
ReadProcessMemory
VirtualLock
VirtualUnlock
FindResourceExW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
LoadResource
FindResourceW
LoadLibraryA
LoadLibraryW
GlobalAlloc
LocalAlloc
SetHandleCount
SetCommMask
SetCommState
SetCommTimeouts
MulDiv
lstrcmpA
lstrcmpiA
lstrlenA
lstrlenW
GlobalAddAtomA
WriteProfileStringW
GetPrivateProfileIntW
MoveFileA
CompareFileTime
IsBadWritePtr
IsBadCodePtr
IsBadStringPtrA
IsBadStringPtrW
SystemTimeToFileTime
GetConsoleCP
GetConsoleOutputCP
ReadConsoleInputA
ReadConsoleInputW
PeekConsoleInputA
ReadConsoleA
ReadConsoleW
WriteConsoleA
WriteConsoleW
SetConsoleCtrlHandler
GetConsoleScreenBufferInfo
SetFilePointerEx
GetConsoleMode
WriteFile
FlushFileBuffers
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCPInfo
GetOEMCP
GetACP
CloseHandle
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
DecodePointer
MoveFileExW
LCMapStringW
MultiByteToWideChar
HeapAlloc
HeapFree
GetModuleFileNameW
GetModuleHandleExW
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsSetValue
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
EncodePointer
SetLastError
GetLastError
InterlockedFlushSList
RtlUnwind
RaiseException
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
SetCurrentDirectoryW
SetCurrentDirectoryA
ExpandEnvironmentStringsW
SetEnvironmentVariableW
GetCommandLineA
SetStdHandle
GetStdHandle
VirtualAllocEx
VirtualAlloc
GetTickCount64
ExitThread
WaitForSingleObjectEx
CreateThread
MoveFileW
ExitProcess
IsWindowVisible
SetForegroundWindow
DialogBoxParamA
SystemParametersInfoW
LoadIconW
LoadBitmapW
SetWindowsHookExW
GetWindow
GetWindowThreadProcessId
FindWindowW
GetDesktopWindow
GetSysColor
MapWindowPoints
ScreenToClient
GetCaretBlinkTime
GetCursor
GetCursorPos
MessageBoxExW
MessageBoxW
MessageBoxA
AdjustWindowRectEx
GetWindowTextLengthW
GetPropW
GetScrollPos
SetScrollPos
ValidateRect
GetDC
GetDlgItemTextW
SetActiveWindow
LoadMenuW
GetSystemMetrics
SetCapture
MapVirtualKeyW
GetKeyboardState
GetKeyState
GetFocus
CharUpperW
GetClipboardData
SetClipboardData
OpenClipboard
GetDlgCtrlID
CheckRadioButton
CheckDlgButton
SetWindowPlacement
FlashWindow
UnregisterClassA
AttachThreadInput
SendMessageCallbackW
SendNotifyMessageW
SendMessageTimeoutW
RegisterWindowMessageW
GetProcessWindowStation
GetThreadDesktop
GetKeyboardLayoutNameW
GetKeyboardLayoutNameA
ActivateKeyboardLayout
FindWindowA
SetTimer
EndDialog
SetDIBitsToDevice
GetStockObject
GetRgnBox
GetRegionData
CreateSolidBrush
CreateRectRgn
CreateFontIndirectW
CreateDIBitmap
CreateDCW
CreateBitmap
CreatePolygonRgn
RegNotifyChangeKeyValue
RegCloseKey
CoInitializeEx
CoCreateGuid
PathFileExistsA
PathGetDriveNumberA
PathFindSuffixArrayA
StrToIntA
ord155
PathFindExtensionA
PathFindOnPathA
DllUnregisterServer
DrawThemeIcon
barmskin
hemocyte
ilicaceae
inapostate
periodontologist
pigweed
postern
pugnaciousness
trichosanthes
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ