caonimama
xiaobing
xiaohua
xiaowen
xiaoxiao
Static task
static1
Behavioral task
behavioral1
Sample
584490f583ebf6d83cee81a243c2d7bd0e2905eea33f25f29eaac2ab37e29195.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
584490f583ebf6d83cee81a243c2d7bd0e2905eea33f25f29eaac2ab37e29195.dll
Resource
win10v2004-20220812-en
Target
584490f583ebf6d83cee81a243c2d7bd0e2905eea33f25f29eaac2ab37e29195
Size
88KB
MD5
6aec149ba19aedcf25cc44bb15a116d1
SHA1
4a60efa552a91c0a2a4081f238cbcf1f99cd4425
SHA256
584490f583ebf6d83cee81a243c2d7bd0e2905eea33f25f29eaac2ab37e29195
SHA512
4304f0ff5ce41d21c9dc974e2dddc887c92101b964010715e4b88f74305fc933228c3c00776dba97c73b1429f8a0c35fc0b898d44ef2a3a4ae7de1fe0ac968c1
SSDEEP
1536:rSgcPe5kuekQKNI9b/ZLzGygn87//lGs/tc+EqfvisytSp0tS5zn4AmCmvX:rrb5kuex9bBLzbgM/t5EsvisF0ezn4AY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
FreeConsole
LocalSize
LocalReAlloc
lstrcmpiA
GetCurrentThreadId
DeleteCriticalSection
GetStartupInfoA
GlobalSize
GlobalAlloc
GlobalLock
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
DeleteFileA
lstrlenA
ReadFile
SetFilePointer
CreateFileA
GetProcAddress
LoadLibraryA
GetLastError
SetLastError
LocalFree
GetFileAttributesA
lstrcatA
GetSystemDirectoryA
InitializeCriticalSection
CreateProcessA
GlobalUnlock
GlobalFree
LocalAlloc
UnmapViewOfFile
HeapAlloc
GetProcessHeap
HeapFree
CreateFileMappingA
MapViewOfFile
GetLocalTime
GetCurrentProcess
GetFileSize
WriteFile
GetTickCount
MoveFileA
MoveFileExA
TerminateThread
OpenProcess
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
EnumWindows
CloseDesktop
SetThreadDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorInfo
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
OpenInputDesktop
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SystemParametersInfoA
SendMessageA
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
wsprintfA
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
CreateWindowExA
CloseWindow
IsWindow
GetClipboardData
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
CallNextHookEx
PostMessageA
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
SelectObject
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
SetServiceStatus
RegisterServiceCtrlHandlerA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegEnumValueA
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyExA
SHDeleteKeyA
_strcmpi
??3@YAXPAX@Z
memmove
ceil
_ftol
strlen
strstr
__CxxFrameHandler
memset
??2@YAPAXI@Z
memcmp
_CxxThrowException
_except_handler3
strncpy
strcat
strcpy
strrchr
malloc
strchr
strncat
realloc
atoi
wcstombs
_beginthreadex
calloc
free
??1type_info@@UAE@XZ
_strnicmp
memcpy
ntohs
recv
select
send
getsockname
closesocket
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
gethostname
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
caonimama
xiaobing
xiaohua
xiaowen
xiaoxiao
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ