?g_dwOperation@@3KA
?g_dwTargetPID@@3KA
FlushBuffer
Init
SM
WLEvtLock
WLEvtLogoff
WLEvtLogon
WLEvtShutdown
WLEvtStartScreenSaver
WLEvtStartup
WLEvtStopScreenSaver
WLEvtUnlock
Static task
static1
Behavioral task
behavioral1
Sample
8fb5f749787a45e2e601c67ef056863f8baaa4b691242561636d21ea2dcceac4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8fb5f749787a45e2e601c67ef056863f8baaa4b691242561636d21ea2dcceac4.dll
Resource
win10v2004-20221111-en
Target
8fb5f749787a45e2e601c67ef056863f8baaa4b691242561636d21ea2dcceac4
Size
64KB
MD5
37bbbbbc7f5a5e54311b4cf0f738bcd2
SHA1
f00301ba8cdf14266a9bb0e9ac1372693c873252
SHA256
8fb5f749787a45e2e601c67ef056863f8baaa4b691242561636d21ea2dcceac4
SHA512
473cc0d577740ef56e8e71ee441e81611cd4df83deaa93a96398d5fcce337dcb6af186848b34abe6049513fb7fd83547f612e6d3ccd73258aa1ee5eb4d54cfd7
SSDEEP
1536:SFaSkdliokEd7/4MBVN2YYiZX6DIGkBqbb9qN:pdliod1/4MBb2YYiZqTkBqP9s
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
gethostname
WSASocketA
WSAIoctl
inet_ntoa
WSAStartup
WSACleanup
recv
send
htons
gethostbyname
inet_addr
socket
connect
closesocket
WSAGetLastError
RegCloseKey
RegQueryValueExA
InitializeAcl
AddAccessAllowedAce
IsValidSid
GetLengthSid
AllocateAndInitializeSid
FreeSid
CreateProcessAsUserA
GetUserNameA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
GetVolumeInformationA
ReadFile
GetDiskFreeSpaceExA
GetDriveTypeA
GetLogicalDriveStringsA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
GetFileInformationByHandle
SystemTimeToFileTime
GetLocalTime
LocalAlloc
InterlockedExchange
GetVersionExA
RaiseException
WideCharToMultiByte
GetModuleFileNameA
CloseHandle
SetEndOfFile
SetFilePointer
WriteFile
GetFileSize
Sleep
GetLastError
CreateFileA
GetComputerNameA
GetSystemDirectoryA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
OpenFileMappingA
FlushViewOfFile
ResetEvent
SetEvent
GlobalUnlock
GlobalLock
CreateThread
GetTickCount
GetTempPathA
GetFileAttributesA
WaitForSingleObject
ExitProcess
GetCurrentProcessId
OpenEventA
CreateEventA
HeapFree
GetProcessHeap
HeapAlloc
CreateToolhelp32Snapshot
Process32Next
VirtualFreeEx
CreateRemoteThread
GetProcAddress
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
Process32First
OpenProcess
ResumeThread
CreateProcessA
ExpandEnvironmentStringsA
LoadLibraryA
FreeLibrary
GetDesktopWindow
GetSystemMetrics
SetWindowsHookExA
GetClassNameA
FindWindowA
EnumChildWindows
CallWindowProcA
SetWindowLongA
UnhookWindowsHookEx
CreateWindowExA
SetClipboardViewer
GetMessageA
TranslateMessage
DispatchMessageA
PostMessageA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
DefWindowProcA
SendMessageA
OpenClipboard
GetClipboardData
CloseClipboard
GetKeyState
GetKeyNameTextA
GetKeyboardState
ToAscii
CallNextHookEx
GetForegroundWindow
GetParent
GetWindowTextA
MapVirtualKeyA
GetWindowLongA
IsWindow
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@XZ
_mbsrev
_mbscmp
_mbsnbcmp
strcat
difftime
time
sprintf
localtime
strstr
rand
srand
_mbsicmp
_mbsstr
isalpha
atoi
free
realloc
malloc
ftell
fseek
strftime
wcstombs
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
__CppXcptFilter
_except_handler3
?terminate@@YAXXZ
__dllonexit
_onexit
??0exception@@QAE@ABV0@@Z
fopen
fclose
fread
fwrite
__CxxFrameHandler
strcpy
_mbsrchr
strlen
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?at@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?g_dwOperation@@3KA
?g_dwTargetPID@@3KA
FlushBuffer
Init
SM
WLEvtLock
WLEvtLogoff
WLEvtLogon
WLEvtShutdown
WLEvtStartScreenSaver
WLEvtStartup
WLEvtStopScreenSaver
WLEvtUnlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ