EndWork
Runing
Working
fuckabc
Static task
static1
Behavioral task
behavioral1
Sample
ab433968e6d0f73cd82b47ce2ce28775f4971caf9db36a718ad926b1a04ecacc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab433968e6d0f73cd82b47ce2ce28775f4971caf9db36a718ad926b1a04ecacc.dll
Resource
win10v2004-20221111-en
Target
ab433968e6d0f73cd82b47ce2ce28775f4971caf9db36a718ad926b1a04ecacc
Size
112KB
MD5
edc3bd1cc6f048503ed2a0f495892ef6
SHA1
630999e71659d01e63374bf3c276882f22986d05
SHA256
ab433968e6d0f73cd82b47ce2ce28775f4971caf9db36a718ad926b1a04ecacc
SHA512
5bfcf42f7cfaeae862ea4cfbe084278e7a46aff7731e4d9582d326b605a50c5a094b0b8dca27d7d1342c8faaf9276a90137cd53220a8e0583d7a9af03e399ba3
SSDEEP
1536:8AiedA8YD5jVv3D5elGOMdcjcM7SfdQMexHkKdcePYUgwitGGrA:8AJdATD5BqMdcj/7kdQMgLPYUgwitdA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetLogicalDriveStringsA
FindClose
LocalFree
GetFileSize
ReadFile
MoveFileA
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
GetModuleHandleA
GetVolumeInformationA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
GetVersionExA
OpenEventA
GetCurrentProcess
Process32Next
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
HeapAlloc
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
VirtualFree
DeleteCriticalSection
ResumeThread
Sleep
TerminateThread
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryA
GlobalFree
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
wsprintfA
GetWindowTextA
MessageBoxA
LoadCursorA
SendMessageA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
SetRect
GetDesktopWindow
ReleaseDC
GetUserObjectInformationA
IsWindowVisible
PostMessageA
IsWindow
CreateWindowExA
LoadMenuA
GetWindowThreadProcessId
DestroyCursor
GetStockObject
RegCloseKey
RegRestoreKeyA
RegQueryValueExA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
CloseServiceHandle
DeleteService
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegOpenKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
StartServiceA
RegSaveKeyA
strcpy
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
srand
_access
wcstombs
atoi
_beginthreadex
strrchr
strcat
strcmp
_except_handler3
malloc
free
strncpy
sprintf
_stricmp
rand
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
puts
memcpy
__CxxFrameHandler
memmove
putchar
ceil
_ftol
strlen
strstr
memcmp
_CxxThrowException
send
inet_addr
connect
sendto
htonl
getsockname
closesocket
select
recv
socket
gethostbyname
htons
setsockopt
WSAStartup
WSACleanup
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
EndWork
Runing
Working
fuckabc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ