LOVELYNN
aabbccdd
daxuewuli
eeffgghh
gaoshu
gongchengshuxue
iijjkkmm
Static task
static1
Behavioral task
behavioral1
Sample
a7ee358b76dad1064fbf7545374539d3df8e0ba5f3a0821c9f2b4e5dbf49bce4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a7ee358b76dad1064fbf7545374539d3df8e0ba5f3a0821c9f2b4e5dbf49bce4.dll
Resource
win10v2004-20220901-en
Target
a7ee358b76dad1064fbf7545374539d3df8e0ba5f3a0821c9f2b4e5dbf49bce4
Size
96KB
MD5
66d7625e7bc558f58d7d60d1d6984976
SHA1
0cc192eec6fcd7da139993e55dc7aad10f52eb5f
SHA256
a7ee358b76dad1064fbf7545374539d3df8e0ba5f3a0821c9f2b4e5dbf49bce4
SHA512
1e81e02dd7f59e32acda97f66c090bea7ac89a49436c19c6b0e58ab9631e5431d0bfb237e7b775174309f57af4fbfc85d7c82d446ef3f9ac5b64cb6d28aee7ee
SSDEEP
3072:8Fi7+4DE6Qh6dPBcKy8C+81y0gttRk0AA1Jx:807cgBTZa+ttm0AK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Process32First
CreateToolhelp32Snapshot
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileExA
GetTickCount
GetLocalTime
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
Process32Next
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
OutputDebugStringA
GlobalMemoryStatusEx
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
lstrcmpiA
GetCurrentThreadId
DeviceIoControl
GetVersion
ExitProcess
GetCurrentProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
CreateEventA
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
GlobalSize
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
SystemParametersInfoA
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
IsWindow
CloseWindow
SendMessageA
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
CharNextA
MessageBoxA
ExitWindowsEx
GetWindowTextA
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
GetActiveWindow
GetDC
GetKeyNameTextA
CreateWindowExA
PostMessageA
OpenDesktopA
OpenInputDesktop
GetThreadDesktop
GetUserObjectInformationA
SetThreadDesktop
CreateCompatibleBitmap
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
LookupAccountNameA
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegDeleteValueA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
IsValidSid
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
SHGetFileInfoA
SHGetSpecialFolderPathA
SHDeleteKeyA
_strnicmp
_beginthreadex
_strupr
??1type_info@@UAE@XZ
calloc
_strcmpi
wcstombs
realloc
strncat
_snprintf
wcscpy
_errno
strncmp
atoi
strncpy
strcat
strrchr
_except_handler3
free
strcmp
strcpy
malloc
strchr
_CxxThrowException
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
waveInReset
waveInStop
waveOutWrite
waveInUnprepareHeader
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInClose
waveOutReset
waveOutClose
waveInStart
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutUnprepareHeader
setsockopt
connect
WSACleanup
select
htons
gethostbyname
socket
closesocket
ntohs
recv
gethostname
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
WSAIoctl
WSAStartup
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
NetLocalGroupAddMembers
NetUserAdd
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
ICOpen
ICSeqCompressFrameEnd
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICClose
ICCompressorFree
GetModuleFileNameExA
EnumProcessModules
WTSFreeMemory
WTSQuerySessionInformationA
LOVELYNN
aabbccdd
daxuewuli
eeffgghh
gaoshu
gongchengshuxue
iijjkkmm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ