Fetch
InPlaceFloorDivide
List_Sort
NewMethod
Optimize
StringAType
Troxy_New
destroy_info_struct
Static task
static1
Behavioral task
behavioral1
Sample
60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c.dll
Resource
win10v2004-20221111-en
Target
60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c
Size
604KB
MD5
4dc9fac124b9cde37c980fa0ba2cd660
SHA1
cb9d9f99a90c941c014e0e5c4b3d53d5c10c8625
SHA256
60764fa5eb79571cdf54c42e1b2f12e7ee96186fab7b51c63cac11b55d936a4c
SHA512
717783aa74d8d52e8b14ebca3b221aac719606603a5a2270177f898e57caff9e4bc71196ac89133fe3fdb559e71297a894281f42d207969b4dd72600ca2f971a
SSDEEP
12288:3CqrU4AOfzSjWf41BfeeY8oZF9B1f7ACAJoTL4SDcxC5T2y:Lw4AObSCfUAeh4f7EJeRDP12y
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
_ftol
ungetc
fclose
_assert
malloc
fseek
getenv
atof
strcpy
strcmp
rand
sscanf
strtok
memset
fopen
strncmp
ftell
fwrite
_stricmp
sprintf
abort
memmove
_iob
strstr
atol
bsearch
sqrt
fgets
fprintf
realloc
printf
memcmp
exit
memcpy
_CIpow
free
atoi
calloc
fread
DdeSetUserHandle
UnhookWindowsHookEx
wsprintfA
WindowFromDC
GetParent
GetWindowThreadProcessId
GetWindowRect
ClientToScreen
DestroyWindow
FillRect
ReleaseDC
MessageBoxA
GetClientRect
GetDC
GetDesktopWindow
FreeLibrary
GetModuleHandleA
TlsGetValue
CreateFileA
GetLastError
EnterCriticalSection
GetModuleFileNameA
TlsAlloc
VirtualAlloc
WriteFile
TlsSetValue
GetCurrentThreadId
Sleep
DeleteCriticalSection
LeaveCriticalSection
GlobalSize
GlobalFree
LoadLibraryA
GlobalAlloc
GetTempPathA
SetLastError
InitializeCriticalSection
SetThreadPriority
GetTickCount
GetVersionExA
GetDateFormatA
TlsFree
GetProcAddress
GetCurrentThread
GetStartupInfoA
SetInformationJobObject
VirtualFree
Fetch
InPlaceFloorDivide
List_Sort
NewMethod
Optimize
StringAType
Troxy_New
destroy_info_struct
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ