Windows
Analysis Report
SunloginClient.exe
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
SunloginClient.exe (PID: 6984 cmdline:
"C:\Users\ user\Deskt op\Sunlogi nClient.ex e" MD5: 499CD2D1127B41E3169C9C4E57F0DC42)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: |
Source: | Static PE information: |
Source: | Key opened: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 DLL Side-Loading | OS Credential Dumping | 1 System Information Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
4% | ReversingLabs |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1476028 |
Start date and time: | 2024-07-18 16:14:51 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | SunloginClient.exe |
Detection: | CLEAN |
Classification: | clean1.winEXE@1/0@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, SI HClient.exe, SgrmBroker.exe, M oUsoCoreWorker.exe, svchost.ex e - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , fe3cr.delivery.mp.microsoft. com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: Sunlog
inClient.exe
File type: | |
Entropy (8bit): | 6.79190756771004 |
TrID: |
|
File name: | SunloginClient.exe |
File size: | 20'115'824 bytes |
MD5: | 499cd2d1127b41e3169c9c4e57f0dc42 |
SHA1: | c1b11001725acbc886c52fa41a42f5719cbb2f49 |
SHA256: | 9df2767ba3bb32dcd0abf293a97d2054c64840b38ef8dd4472092079e3799f0a |
SHA512: | e553a4e5e65577f781f0be338cab28f2567694c393bd594c1272e878c715340c2af22dcb563dbf3a2d42cfa0f5ea7f84ded0887100934920cdd2755503a26e20 |
SSDEEP: | 196608:7NTBGKbeIJ4/qymfzqEsdxcNq93pPFHQAqiTrHRncxx:htTN5Ps/93p9wfifHJc |
TLSH: | A517AE0AB26104E9D5ABC038C966D617E770382D43F15BFB6691A6E52F33BD07E3A701 |
File Content Preview: | MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$...........]...]...].....$.}.....&.......'.....zRT.\.......^....4..V...f...C...f.......f...w...T.].\...T.V.[...8..._...........]...... |
Icon Hash: | 51cc5c7864c34c21 |
Entrypoint: | 0x1405deaf0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x64E87CC8 [Fri Aug 25 10:04:56 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 2 |
File Version Major: | 5 |
File Version Minor: | 2 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 2 |
Import Hash: | f9f00adb1c807d7b4833189f5762e3e2 |
Signature Valid: | true |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 4B9D41932E6196B184C8FD17165354C7 |
Thumbprint SHA-1: | CD22D7228E666132008B90BB8D2D143BFD36D4EF |
Thumbprint SHA-256: | 658F857CE4799274304A975548F10D98F6D693AE108F4ED738317CAE7FDF7583 |
Serial: | 04A5A133E7FEDB53C8F16687CFBC4EDB |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007FF38D711720h |
dec eax |
add esp, 28h |
jmp 00007FF38D710F77h |
int3 |
int3 |
jmp 00007FF38D710CECh |
int3 |
int3 |
int3 |
jmp 00007FF38D710E60h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
nop word ptr [eax+eax+00000000h] |
dec eax |
sub esp, 10h |
dec esp |
mov dword ptr [esp], edx |
dec esp |
mov dword ptr [esp+08h], ebx |
dec ebp |
xor ebx, ebx |
dec esp |
lea edx, dword ptr [esp+18h] |
dec esp |
sub edx, eax |
dec ebp |
cmovb edx, ebx |
dec esp |
mov ebx, dword ptr [00000010h] |
dec ebp |
cmp edx, ebx |
jnc 00007FF38D71110Ah |
inc cx |
and edx, 8D4DF000h |
wait |
add al, dh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x11ae8c0 | 0x1b8 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1acc000 | 0xaff70 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x1a52000 | 0x621e4 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x132a600 | 0x4b70 | .data |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x1b7c000 | 0x13a60 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x1102770 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x1102848 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x11027b0 | 0x94 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xcf2000 | 0x1310 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xcf01ee | 0xcf0200 | 603d292a4842b98493dbbe2e52dfc28e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xcf2000 | 0x4c0886 | 0x4c0a00 | e32db781a038b0128ddf827de6a05d82 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x11b3000 | 0x89ef08 | 0x3f400 | cd25198a671520d1fd3f9d1103d80e6f | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x1a52000 | 0x621e4 | 0x62200 | 5ecc5c6cbc9f36c06b01ec3b9f089382 | False | 0.49471785429936305 | data | 6.783199069621397 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rodata | 0x1ab5000 | 0x8580 | 0x8600 | 568077383c969fb0256735e2349555d3 | False | 0.13803055037313433 | data | 5.401526848490211 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.gfids | 0x1abe000 | 0x8b0 | 0xa00 | be2326f7c6b568f7c40c676b4eecff68 | False | 0.344921875 | data | 3.719074619841043 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.tls | 0x1abf000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
_RDATA | 0x1ac0000 | 0xaf30 | 0xb000 | 899591eece7e353f0c786a6a6268abe2 | False | 0.6888760653409091 | data | 7.080757285303249 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.custom | 0x1acb000 | 0x198 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x1acc000 | 0xaff70 | 0xb0000 | 6832e6b4674a7c09c114b3fa198821be | False | 0.8743924227627841 | data | 7.855334555768831 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x1b7c000 | 0x13a60 | 0x13c00 | aa33e45b355ede2fdabae78ff7db1bab | False | 0.23358386075949367 | data | 5.482800662643748 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
AGENTDWM | 0x1b00738 | 0x22415 | zlib compressed data | Chinese | China | 0.9999144744813233 |
DDAPRIVSP | 0x1b22b50 | 0x2faf4 | zlib compressed data | Chinese | China | 0.9980339552315223 |
DDAPRIVSP | 0x1b52648 | 0x29467 | zlib compressed data | Chinese | China | 0.999757486854013 |
RT_ICON | 0x1acc840 | 0x462d | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | Chinese | China | 1.0008906206512664 |
RT_ICON | 0x1ad0e70 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 1152 | Chinese | China | 0.4121951219512195 |
RT_ICON | 0x1ad14d8 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | Chinese | China | 0.5 |
RT_ICON | 0x1ad17c0 | 0x1e8 | Device independent bitmap graphic, 24 x 48 x 4, image size 288 | Chinese | China | 0.5348360655737705 |
RT_ICON | 0x1ad19a8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128 | Chinese | China | 0.5574324324324325 |
RT_ICON | 0x1ad1ad0 | 0x7a3d | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | Chinese | China | 0.9963570127504554 |
RT_ICON | 0x1ad9510 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | Chinese | China | 0.427771855010661 |
RT_ICON | 0x1ada3b8 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | Chinese | China | 0.4305054151624549 |
RT_ICON | 0x1adac60 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors | Chinese | China | 0.42914746543778803 |
RT_ICON | 0x1adb328 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | Chinese | China | 0.36127167630057805 |
RT_ICON | 0x1adb890 | 0xbf1e | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | Chinese | China | 1.0004292196378204 |
RT_ICON | 0x1ae77b0 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | Chinese | China | 0.19138175795575535 |
RT_ICON | 0x1af7fd8 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | Chinese | China | 0.18865139348134152 |
RT_ICON | 0x1afc200 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | Chinese | China | 0.21732365145228216 |
RT_ICON | 0x1afe7a8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | Chinese | China | 0.26360225140712945 |
RT_ICON | 0x1aff850 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | Chinese | China | 0.33852459016393444 |
RT_ICON | 0x1b001d8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | Chinese | China | 0.46808510638297873 |
RT_GROUP_ICON | 0x1b00640 | 0xf4 | data | Chinese | China | 0.5983606557377049 |
RT_VERSION | 0x1acc520 | 0x320 | data | Chinese | China | 0.47625 |
RT_MANIFEST | 0x1b7bab0 | 0x4ba | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1150), with CRLF line terminators | English | United States | 0.46859504132231405 |
DLL | Import |
---|---|
CRYPT32.dll | CertOpenStore, CertEnumCertificatesInStore, CertDuplicateCertificateContext, CertGetNameStringW, CertFindCertificateInStore, CryptMsgGetParam, CertCloseStore, CryptQueryObject, CertFreeCertificateContext, CryptMsgClose, CertGetCertificateContextProperty |
WINMM.dll | timeGetTime |
WINSPOOL.DRV | EnumPrintProcessorsW, ClosePrinter, AddPrinterA, DeletePrinter, EnumPrinterDriversW, OpenPrinterA, GetPrintProcessorDirectoryA |
SETUPAPI.dll | SetupDiGetDeviceInterfaceDetailA, SetupDiGetClassDevsW, SetupDiGetDeviceRegistryPropertyW, SetupDiGetDeviceInterfaceDetailW, CM_Get_Device_Interface_ListW, SetupDiEnumDeviceInfo, SetupDiEnumDeviceInterfaces, SetupDiDestroyDeviceInfoList, SetupDiSetClassInstallParamsW, SetupDiChangeState, CM_Get_Device_Interface_List_SizeW |
HID.DLL | HidD_FreePreparsedData, HidD_GetAttributes, HidP_GetCaps, HidD_GetPreparsedData, HidD_GetHidGuid |
KERNEL32.dll | VirtualFree, VirtualAlloc, VirtualAllocEx, FlushInstructionCache, CreateRemoteThread, lstrcpyA, GetSystemTime, GetTempFileNameA, ProcessIdToSessionId, GetLocalTime, DeviceIoControl, CreateFileA, GetSystemDirectoryW, TerminateThread, GlobalSize, GetSystemTimes, CompareFileTime, GetDiskFreeSpaceExW, FreeResource, VirtualQuery, GlobalAddAtomW, WaitForSingleObjectEx, GetConsoleMode, WriteConsoleW, GetProcessAffinityMask, GetThreadPriority, ReadConsoleA, GetEnvironmentVariableW, GlobalMemoryStatus, ConvertThreadToFiber, ConvertFiberToThread, CreateFiber, DeleteFiber, SwitchToFiber, SwitchToThread, CreateWaitableTimerW, SetWaitableTimer, HeapQueryInformation, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, IsValidCodePage, FindNextFileA, FindFirstFileExA, SetEndOfFile, SetStdHandle, GetCurrentDirectoryW, ReadConsoleW, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, GetACP, VirtualProtect, ExitProcess, SetConsoleCtrlHandler, GetTimeZoneInformation, SetFilePointerEx, GetConsoleCP, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, SetConsoleMode, CreateDirectoryW, GetFileAttributesExW, GetFileType, GetDriveTypeW, LoadLibraryExW, RtlUnwindEx, RtlPcToFileHeader, SetConsoleTextAttribute, GetConsoleScreenBufferInfo, CreateSemaphoreA, CreateEventA, LoadLibraryExA, InterlockedPushEntrySList, InterlockedPopEntrySList, OutputDebugStringW, InitializeSListHead, GetStartupInfoW, IsProcessorFeaturePresent, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, GetLocaleInfoW, LCMapStringW, CompareStringW, GetCPInfo, EncodePointer, GetStringTypeW, DisconnectNamedPipe, PeekNamedPipe, CreateNamedPipeA, SetUnhandledExceptionFilter, RtlCaptureContext, GetLogicalDriveStringsW, GetVolumeInformationW, OpenMutexW, CreateMutexW, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetUserDefaultLangID, FileTimeToDosDateTime, GetFileTime, GetSystemDirectoryA, QueryPerformanceCounter, QueryPerformanceFrequency, WriteProcessMemory, GetProcessId, VerSetConditionMask, VerifyVersionInfoW, MoveFileExW, GetExitCodeThread, OpenEventW, GetNativeSystemInfo, SetProcessShutdownParameters, GetCommandLineW, SetPriorityClass, GetModuleHandleA, GetProcAddress, GetTickCount, HeapFree, EnterCriticalSection, ReleaseSemaphore, WaitForMultipleObjects, InitializeCriticalSectionAndSpinCount, LeaveCriticalSection, InitializeCriticalSection, WaitForSingleObject, HeapSize, CreateEventW, GetLastError, SetEvent, HeapReAlloc, CloseHandle, RaiseException, ResetEvent, HeapAlloc, DecodePointer, HeapDestroy, DeleteCriticalSection, GetProcessHeap, CreateSemaphoreW, CreateDirectoryA, GetTempPathW, SetLastError, GetExitCodeProcess, LocalAlloc, WritePrivateProfileStringA, WritePrivateProfileStringW, TryEnterCriticalSection, ConnectNamedPipe, GlobalUnlock, MapViewOfFile, CreateFileMappingW, IsBadReadPtr, WideCharToMultiByte, CopyFileW, GetModuleHandleW, CreateProcessW, GetCurrentProcessId, LocalFree, GlobalLock, FindResourceW, LoadResource, FindResourceExW, GetSystemInfo, GlobalFree, Process32FirstW, DeleteFileW, GlobalAlloc, LockResource, GetCurrentThread, Process32NextW, GetTempPathA, CreateToolhelp32Snapshot, GetCommandLineA, GetVersion, UnmapViewOfFile, OpenFileMappingW, GetFileAttributesW, CreateFileW, FindNextFileW, FindClose, GetModuleFileNameW, TerminateProcess, GetFileSizeEx, FindFirstFileW, SizeofResource, GetModuleFileNameA, ReadFile, ReleaseMutex, CreateMutexA, LoadLibraryA, SystemTimeToFileTime, GetVersionExW, GetCurrentProcess, GetFullPathNameW, GetSystemTimeAsFileTime, TlsFree, TlsGetValue, CreateThread, TlsAlloc, Sleep, ResumeThread, SetThreadPriority, TlsSetValue, MultiByteToWideChar, IsDebuggerPresent, FreeLibrary, LoadLibraryW, GetCurrentThreadId, OutputDebugStringA, WriteFile, GetStdHandle |
USER32.dll | DrawTextW, GetSysColor, GetIconInfo, GetProcessWindowStation, EnumDisplayDevicesA, GetMonitorInfoA, EnumDisplaySettingsA, UnregisterClassW, GetMonitorInfoW, EnumDisplayMonitors, GetDesktopWindow, SetRectEmpty, EnumDisplayDevicesW, InvalidateRect, SetRect, IntersectRect, IsRectEmpty, WindowFromPoint, GetGUIThreadInfo, SwapMouseButton, GetParent, OpenDesktopW, EnumWindows, BlockInput, GetDoubleClickTime, ClientToScreen, RegisterClassW, VkKeyScanW, SetActiveWindow, OffsetRect, ReleaseDC, SetForegroundWindow, SystemParametersInfoW, SetClipboardData, GetWindowDC, GetClipboardData, GetForegroundWindow, AttachThreadInput, EmptyClipboard, CloseClipboard, OpenClipboard, RegisterDeviceNotificationW, IsWindow, ShowWindow, GetKeyboardState, IsWindowVisible, PostMessageW, GetWindowThreadProcessId, GetWindowLongW, GetDC, MessageBoxW, SetWindowLongW, SetLayeredWindowAttributes, PeekMessageW, SetTimer, DispatchMessageW, GetWindowLongPtrW, MsgWaitForMultipleObjects, SendMessageW, SetWindowLongPtrW, SetWindowPos, DestroyWindow, GetWindowRect, FindWindowExW, DefWindowProcW, GetCursorPos, SendInput, LockWorkStation, GetSystemMetrics, MapVirtualKeyW, DrawIcon, GetClientRect, SetPropW, RemovePropW, GetPropW, DrawIconEx, SendMessageTimeoutW, SetClipboardViewer, GetClipboardOwner, GetKeyState, OpenInputDesktop, CloseDesktop, GetThreadDesktop, SetThreadDesktop, GetUserObjectInformationA, SetCursorPos, PtInRect, KillTimer, GetDialogBaseUnits, DialogBoxIndirectParamW, EndDialog, RegisterClipboardFormatA, GetPriorityClipboardFormat, EnumDisplaySettingsW, ChangeDisplaySettingsExA, EnumDisplaySettingsExA, ExitWindowsEx, EnumDisplaySettingsExW, ChangeDisplaySettingsExW, GetUserObjectInformationW, LoadCursorW, GetClipCursor, GetCursorInfo, UnregisterDeviceNotification, GetClassInfoExW, GetClassInfoW, CloseWindow, GetUpdateRgn, PostThreadMessageW, TranslateMessage, RegisterClassExW, CreateWindowExW, CallWindowProcW, GetMessageW, RegisterWindowMessageW, PostQuitMessage, GetRawInputDeviceInfoA, SetWindowsHookExW, RegisterRawInputDevices, UnhookWindowsHookEx, GetRawInputData, CallNextHookEx, GetOpenClipboardWindow, ChangeClipboardChain, RegisterClipboardFormatW |
GDI32.dll | MoveToEx, GetDIBits, CreateFontW, LineTo, CreatePen, Rectangle, Ellipse, CreateRectRgn, GetRegionData, BitBlt, StretchBlt, CreateRectRgnIndirect, SelectClipRgn, CombineRgn, GetRgnBox, SetDIBColorTable, GdiFlush, SetDIBitsToDevice, GetBitmapBits, ExtEscape, GetDIBColorTable, CreateDCW, GetPixel, CreateDIBSection, GetStockObject, SetTextColor, SetBkMode, GetObjectW, CreateFontIndirectW, DeleteObject, CreateSolidBrush, GetDeviceCaps, SelectObject, CreateCompatibleDC, DeleteDC |
ADVAPI32.dll | OpenProcessToken, MakeAbsoluteSD, MakeSelfRelativeSD, GetSecurityDescriptorLength, GetLengthSid, InitializeAcl, InitializeSecurityDescriptor, FreeSid, CryptEnumProvidersW, CryptSignHashW, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptGetProvParam, CryptSetHashParam, CryptDestroyKey, ReportEventW, RegisterEventSourceW, DeregisterEventSource, RegEnumKeyExW, CryptAcquireContextA, RegQueryInfoKeyW, CryptGenRandom, RegCreateKeyW, EnumServicesStatusW, SetSecurityInfo, BuildTrusteeWithSidW, GetSecurityInfo, QueryServiceStatus, UnlockServiceDatabase, CloseServiceHandle, OpenSCManagerW, LockServiceDatabase, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, QueryServiceStatusEx, LookupPrivilegeValueW, AdjustTokenPrivileges, RegCloseKey, CryptAcquireContextW, SetTokenInformation, SetEntriesInAclW, CreateWellKnownSid, RegCreateKeyExW, CryptCreateHash, RegSetValueExW, CryptDestroyHash, CheckTokenMembership, RegOpenKeyExW, CreateProcessAsUserW, RegDeleteValueW, GetUserNameW, DuplicateTokenEx, RegQueryValueExW, CryptReleaseContext, GetSecurityDescriptorSacl, SetSecurityDescriptorDacl, GetSecurityDescriptorDacl, GetAclInformation, AllocateAndInitializeSid, GetSecurityDescriptorGroup, GetSecurityDescriptorControl, CopySid, GetSecurityDescriptorOwner, IsValidSid, AddAce |
SHELL32.dll | SHGetSpecialFolderPathW, SHGetFileInfoW, DragQueryPoint, DragQueryFileW, SHCreateDirectoryExA, SHGetFolderPathW, ShellExecuteExW, CommandLineToArgvW |
ole32.dll | OleSetClipboard, OleUninitialize, DoDragDrop, ReleaseStgMedium, RegisterDragDrop, OleInitialize, CoInitializeSecurity, StringFromGUID2, CoSetProxyBlanket, CoCreateInstance, CoInitializeEx, CoUninitialize, CoInitialize, CoTaskMemFree, CoTaskMemRealloc, CreateStreamOnHGlobal, CoTaskMemAlloc |
OLEAUT32.dll | VariantClear, SysAllocString, SysAllocStringLen, SysFreeString, VariantInit |
SHLWAPI.dll | PathFileExistsA, PathFileExistsW, PathRemoveFileSpecW, PathRemoveFileSpecA, StrStrIA, PathStripPathW, PathFindExtensionW, SHCreateStreamOnFileW |
USERENV.dll | CreateEnvironmentBlock |
WS2_32.dll | gethostbyname, WSAGetLastError, setsockopt, ioctlsocket, sendto, getsockopt, recv, recvfrom, connect, socket, send, getsockname, shutdown, WSASetLastError, inet_addr, gethostbyaddr, getservbyport, ntohs, inet_ntoa, getservbyname, htonl, htons, __WSAFDIsSet, select, gethostname, WSACleanup, WSAStartup, accept, bind, closesocket, listen, getpeername |
WTSAPI32.dll | WTSFreeMemory, WTSQuerySessionInformationW |
IPHLPAPI.DLL | GetAdaptersInfo, GetIpForwardTable |
gdiplus.dll | GdipFree, GdipAlloc, GdipCloneImage, GdipGetImageHeight, GdiplusStartup, GdiplusShutdown, GdipDrawImageI, GdipDeleteGraphics, GdipGetImageWidth, GdipDisposeImage, GdipCreateBitmapFromScan0, GdipGetImagePalette, GdipGetImageGraphicsContext, GdipBitmapLockBits, GdipGetImagePixelFormat, GdipCreateBitmapFromStream, GdipBitmapUnlockBits, GdipGetImagePaletteSize |
MSIMG32.dll | TransparentBlt, AlphaBlend |
dbghelp.dll | SymCleanup, SymGetModuleBase64, SymGetModuleInfo64, SymGetLineFromAddr64, SymFunctionTableAccess64, SymInitialize, StackWalk64, SymGetSymFromAddr64 |
VERSION.dll | VerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Chinese | China | |
English | United States |