CreateLogObjects
DeleteLogObjects
Static task
static1
Behavioral task
behavioral1
Sample
39b687c3243adb053b37471a6ef4ed8dc58d8f4dc5b673f495c1c0f24b8c1e70.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39b687c3243adb053b37471a6ef4ed8dc58d8f4dc5b673f495c1c0f24b8c1e70.dll
Resource
win10v2004-20220812-en
Target
39b687c3243adb053b37471a6ef4ed8dc58d8f4dc5b673f495c1c0f24b8c1e70
Size
120KB
MD5
ccf9b0c12ffc9abea1b56b0447a8b04d
SHA1
fa9da14add466d4e68462b6fab8b2f6ce95a65cf
SHA256
39b687c3243adb053b37471a6ef4ed8dc58d8f4dc5b673f495c1c0f24b8c1e70
SHA512
7bb268ae6f5ecf274aca852097835742b7d247d0d9787bbb45092e905672f69657e3873028154e99d21815af52559c5b510a94f1cfdba488988c2af107fdf3ab
SSDEEP
1536:Hr8dRyC09ESIYBl6kpT9SfYH2JhuJLdciNjf7viasvyy3B61Jjikx:HrTChSIy4Ur8hcLdlND7viiyx61Jjik
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
wsprintfA
wvsprintfA
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
lstrcpyA
lstrlenA
Sleep
VirtualFree
GetTickCount
GetProcAddress
LoadLibraryA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSection
time
strtok
memcpy
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
__dllonexit
_onexit
_strnicmp
localtime
strftime
strchr
atoi
strncat
strrchr
_except_handler3
malloc
free
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
strlen
realloc
_beginthreadex
send
recv
select
getsockname
gethostname
??1ofstream@@UAE@XZ
?close@ofstream@@QAEXXZ
?write@ostream@@QAEAAV1@PBDH@Z
?open@ofstream@@QAEXPBDHH@Z
?openprot@filebuf@@2HB
??1fstream@@UAE@XZ
??1ios@@UAE@XZ
?close@fstream@@QAEXXZ
?read@istream@@QAEAAV1@PADH@Z
?open@fstream@@QAEXPBDHH@Z
??0fstream@@QAE@XZ
??0ofstream@@QAE@XZ
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
CreateLogObjects
DeleteLogObjects
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ