EndWork
Runing
Working
fuckabc
Static task
static1
Behavioral task
behavioral1
Sample
cf6935da79cbc13c16d89bde1475cf37b91d5d87651ae38d11fc1b6a6fcdbb20.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cf6935da79cbc13c16d89bde1475cf37b91d5d87651ae38d11fc1b6a6fcdbb20.dll
Resource
win10v2004-20221111-en
Target
cf6935da79cbc13c16d89bde1475cf37b91d5d87651ae38d11fc1b6a6fcdbb20
Size
112KB
MD5
ca30a04364a191d4f62c59f9fcb23d4d
SHA1
424443328ff7fa531c6b15dc5efd20ca2cc263c3
SHA256
cf6935da79cbc13c16d89bde1475cf37b91d5d87651ae38d11fc1b6a6fcdbb20
SHA512
62220f78f6307f0b64e62c474ef0ceac1476506fdd21618a2379b1fef62f6398408ff3481966d1de8869552e7f64ca6085292807420de12d6464c4b85f6397f5
SSDEEP
1536:8AiedA8YD5jVv3D5elGOMdcjcM7SfdQMexHkKdcePYUgw0tGGrA:8AJdATD5BqMdcj/7kdQMgLPYUgw0tdA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetLogicalDriveStringsA
FindClose
LocalFree
GetFileSize
ReadFile
MoveFileA
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
GetModuleHandleA
GetVolumeInformationA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
GetVersionExA
OpenEventA
GetCurrentProcess
Process32Next
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
HeapAlloc
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
VirtualFree
DeleteCriticalSection
ResumeThread
Sleep
TerminateThread
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryA
GlobalFree
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
wsprintfA
GetWindowTextA
MessageBoxA
LoadCursorA
SendMessageA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
SetRect
GetDesktopWindow
ReleaseDC
GetUserObjectInformationA
IsWindowVisible
PostMessageA
IsWindow
CreateWindowExA
LoadMenuA
GetWindowThreadProcessId
DestroyCursor
GetStockObject
RegCloseKey
RegRestoreKeyA
RegQueryValueExA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
CloseServiceHandle
DeleteService
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegOpenKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
StartServiceA
RegSaveKeyA
strcpy
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
srand
_access
wcstombs
atoi
_beginthreadex
strrchr
strcat
strcmp
_except_handler3
malloc
free
strncpy
sprintf
_stricmp
rand
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
puts
memcpy
__CxxFrameHandler
memmove
putchar
ceil
_ftol
strlen
strstr
memcmp
_CxxThrowException
send
inet_addr
connect
sendto
htonl
getsockname
closesocket
select
recv
socket
gethostbyname
htons
setsockopt
WSAStartup
WSACleanup
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
EndWork
Runing
Working
fuckabc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ