UTRF
haluo
server
Static task
static1
Behavioral task
behavioral1
Sample
7f087288acf4b2697c52878968192addccf731710e4783339e27e50dfd4a3db1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f087288acf4b2697c52878968192addccf731710e4783339e27e50dfd4a3db1.exe
Resource
win10v2004-20220812-en
Target
7f087288acf4b2697c52878968192addccf731710e4783339e27e50dfd4a3db1
Size
144KB
MD5
c40af21747a1eade3ebf0744e348fed6
SHA1
0fa685e3e8fbd7836c215008d1a0879aa9edd7c4
SHA256
7f087288acf4b2697c52878968192addccf731710e4783339e27e50dfd4a3db1
SHA512
6855378d7dec2080319a876b173a1adadc8a05d1d6575d06ec2771fd88662beeddbfc8dab9a8418ba89d47e857e9bdad7d7c534028d7872a3d891a358b95c513
SSDEEP
3072:2EnuX1gX0Ef9ZoMb9QWhXSuB+fAu7bQNGOQNqEz5RcQEhSgQSFg3kmivdcOVjz:Nndf+tsVs2Fg0fuOVj
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_decode_pointer
_onexit
_lock
__dllonexit
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
_stricmp
_controlfp_s
_strnicmp
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
calloc
_beginthreadex
realloc
strncat
_errno
strncmp
atoi
strncpy
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
strrchr
??_U@YAPAXI@Z
free
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
malloc
strchr
memmove
ceil
strstr
memcpy
memset
??3@YAXPAX@Z
_CxxThrowException
__CxxFrameHandler3
??2@YAPAXI@Z
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedCompareExchange
GetCurrentThreadId
lstrcmpiA
GetSystemInfo
GlobalMemoryStatusEx
GetProcAddress
LoadLibraryA
CloseHandle
TerminateThread
Sleep
WaitForSingleObject
SetEvent
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
CreateEventA
lstrcpyA
ResetEvent
lstrlenA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
GetLastError
CreateDirectoryA
GetFileAttributesA
GetVolumeInformationA
GetLogicalDriveStringsA
LocalFree
LocalReAlloc
LocalAlloc
GetFileSize
ReadFile
GetCurrentProcess
OpenProcess
GetTickCount
GetTempPathA
InterlockedExchange
WriteFile
SetFilePointer
CreateFileA
GetSystemDirectoryA
GetLocalTime
GlobalFree
TerminateProcess
WaitForMultipleObjects
GetStartupInfoA
GetWindowTextA
GetKeyState
LoadCursorA
DestroyCursor
GetCursorInfo
GetDC
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
CloseWindow
SendMessageA
IsWindow
CreateWindowExA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
DeleteDC
GetDIBits
CreateCompatibleBitmap
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
OpenServiceA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
SHGetFileInfoA
SHGetSpecialFolderPathA
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInStart
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInAddBuffer
waveOutClose
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
ntohs
getsockname
bind
inet_addr
recvfrom
__WSAFDIsSet
getpeername
accept
listen
WSACleanup
gethostname
inet_ntoa
socket
gethostbyname
htons
connect
select
recv
send
setsockopt
closesocket
sendto
WSAStartup
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICSeqCompressFrame
ICClose
ICCompressorFree
EnumProcessModules
WTSFreeMemory
WTSQuerySessionInformationA
UTRF
haluo
server
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ