MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
404Keylogger
Vendor detections: 13
| SHA256 hash: | cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67 |
|---|---|
| SHA3-384 hash: | 245efe139cedc4314e34bda3be2daac81a2333fb03191a6620b62487159fd0449a745d4a4ce07e98dda5f17e3a1ad7d9 |
| SHA1 hash: | eb202190e18a2c647a1972549b9a74544ca2e94f |
| MD5 hash: | 81bc0f1492f7300d467bee66e60d3fbd |
| humanhash: | burger-coffee-solar-skylark |
| File name: | cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67 |
| Download: | download sample |
| Signature | 404Keylogger |
| File size: | 1'205'248 bytes |
| First seen: | 2024-09-09 11:19:43 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | cc2b3e63a50ba98c3412285dee7a8f0b (16 x AgentTesla, 5 x RemcosRAT, 3 x 404Keylogger) |
| ssdeep | 24576:bqDEvCTbMWu7rQYlBQcBiT6rpFd+zs0ALMe4brco:bTvC/MTQYxsWPkzsaX |
| Threatray | 3'615 similar samples on MalwareBazaar |
| TLSH | T1C145BF027381D022FF9BA6334F5AE6514BBC79260123E61F13981D7ABE705B1563E7A3 |
| TrID | 52.2% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 24.0% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 9.5% (.EXE) Win64 Executable (generic) (10523/12/4) 4.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.0% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | 404Keylogger exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
374
Origin country :
HUVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67
Verdict:
No threats detected
Analysis date:
2024-09-05 13:50:24 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
Malware
Result
Verdict:
Clean
Maliciousness:
Behaviour
Searching for the window
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
autoit epmicrosoft_visual_cc fingerprint keylogger lolbin microsoft_visual_cc packed razy shell32
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2024-09-06 08:56:37 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
29 of 38 (76.32%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 3'605 additional samples on MalwareBazaar
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7d03c245636ceeed78c6bb08041c65594c93449c145b451d0c465c7b227169bc
MD5 hash:
364c5f5d4b83f462ec6f3fb4fadecd38
SHA1 hash:
bdfe9fe04786b15d5e901357cb1f0e06b545a370
Detections:
win_404keylogger_g1
MAL_Envrial_Jan18_1
Parent samples :
6bfb0f467d70e67c4d5406c39a7b4ce5ce0b81b0c8318d51a078b77bddcdd275
b51175581d84bf44fdbadff6a71ecc7c4cec821be778d0cbc7eb9a6417e8ff96
579c7148f42c09b133fa616244cb4497034adf370f8e724bd1a9afdd0c7e004d
fd2bd6b337113729beeb74f7446d2b777315abca4d557a5cfd7acd679add2d65
6d524f19183002c058639b24455f309f78f225ee0a0210cfd820b83609f132ad
3f2a538487752f1c35b02c32e9bf2d14d84da017076bd8c66a7185d4de32baf7
ed94e4340621581cec927c362247b765e8eec9946069d54c36cac2e7ce1236f7
76a1146953eeb963c6eae47e2c22729d21199ef5d5e2d68f09bee651792d89e7
6a5fb55dd9dff7b874d54775cc1c1c9dfba6d99665d21a3630a1958c0ba7a547
96b4dc68d491b25769c36f74ad0403c1e775cd4c02b7859941267f40d1834419
cc74dce37e3eb30eb01e92d8413871cfbbf614e12730af6f8dc0f55cadb11aa6
29205d95468e39eb69b47f1bbec3c93411003098765e5b2af4adeab341dc24a0
cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67
7fe8eb1d71fbf75851d70673fa7e5d90c95c643437be3b5b0a7e104439263684
ee4be32b511a342b4a82953fdd12d66d042342b28b508ba4612dddef54b7d3c5
5bad9df94dcc60bb8e5c4137f2d1026c84787aed707ec9e95f5e6f05e70e290b
0812c989fb4ccd9ecc95deacd727da799b88ae487e0edd4dcee900429a420065
b43ad962fd2871e8d704ed4b44f719dee7793e90387563292fe48744d86a4e54
0bbc0a1fa2a101549dc68f2a9c087b5c9ce88957163a83425457a88fbfc4c1de
fc657851d2b6c7d93e46364069b6a96e8f1b927b9e6e9a8066aaf51060a957f8
49b3a5b9adc10281015d59ca3b9439cd1201712133895cb848d33c66c8fbb1bc
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
cefa40083339d42320bc1f9ba33c578b8abe47e15eb0dd6b0ba2f734aa8f3d6d
86f02fd88dc04b311ec6ae30fc2e4fc8be6884f24654a5103b7fb85f7631f99c
c52ce3f8d1b53883d52c55a97e6d33cb52a85725bb8edfb9f0e043f3b45a53a6
57be4ec7980a2d28a02541067688d47feecf59e71fdb022aa93fe84c04429c55
b51175581d84bf44fdbadff6a71ecc7c4cec821be778d0cbc7eb9a6417e8ff96
579c7148f42c09b133fa616244cb4497034adf370f8e724bd1a9afdd0c7e004d
fd2bd6b337113729beeb74f7446d2b777315abca4d557a5cfd7acd679add2d65
6d524f19183002c058639b24455f309f78f225ee0a0210cfd820b83609f132ad
3f2a538487752f1c35b02c32e9bf2d14d84da017076bd8c66a7185d4de32baf7
ed94e4340621581cec927c362247b765e8eec9946069d54c36cac2e7ce1236f7
76a1146953eeb963c6eae47e2c22729d21199ef5d5e2d68f09bee651792d89e7
6a5fb55dd9dff7b874d54775cc1c1c9dfba6d99665d21a3630a1958c0ba7a547
96b4dc68d491b25769c36f74ad0403c1e775cd4c02b7859941267f40d1834419
cc74dce37e3eb30eb01e92d8413871cfbbf614e12730af6f8dc0f55cadb11aa6
29205d95468e39eb69b47f1bbec3c93411003098765e5b2af4adeab341dc24a0
cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67
7fe8eb1d71fbf75851d70673fa7e5d90c95c643437be3b5b0a7e104439263684
ee4be32b511a342b4a82953fdd12d66d042342b28b508ba4612dddef54b7d3c5
5bad9df94dcc60bb8e5c4137f2d1026c84787aed707ec9e95f5e6f05e70e290b
0812c989fb4ccd9ecc95deacd727da799b88ae487e0edd4dcee900429a420065
b43ad962fd2871e8d704ed4b44f719dee7793e90387563292fe48744d86a4e54
0bbc0a1fa2a101549dc68f2a9c087b5c9ce88957163a83425457a88fbfc4c1de
fc657851d2b6c7d93e46364069b6a96e8f1b927b9e6e9a8066aaf51060a957f8
49b3a5b9adc10281015d59ca3b9439cd1201712133895cb848d33c66c8fbb1bc
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
cefa40083339d42320bc1f9ba33c578b8abe47e15eb0dd6b0ba2f734aa8f3d6d
86f02fd88dc04b311ec6ae30fc2e4fc8be6884f24654a5103b7fb85f7631f99c
c52ce3f8d1b53883d52c55a97e6d33cb52a85725bb8edfb9f0e043f3b45a53a6
57be4ec7980a2d28a02541067688d47feecf59e71fdb022aa93fe84c04429c55
SH256 hash:
473a07e2c14fc6cc6e5283357864b25e024e4657a12cff08f6f82a5043407224
MD5 hash:
827ee3875416d184a7a59c24e52d9cb2
SHA1 hash:
353639c78a9bf5b62ff865e0897b8c4c8a31625f
Detections:
win_404keylogger_g1
MAL_Envrial_Jan18_1
Parent samples :
6bfb0f467d70e67c4d5406c39a7b4ce5ce0b81b0c8318d51a078b77bddcdd275
b51175581d84bf44fdbadff6a71ecc7c4cec821be778d0cbc7eb9a6417e8ff96
579c7148f42c09b133fa616244cb4497034adf370f8e724bd1a9afdd0c7e004d
fd2bd6b337113729beeb74f7446d2b777315abca4d557a5cfd7acd679add2d65
6d524f19183002c058639b24455f309f78f225ee0a0210cfd820b83609f132ad
3f2a538487752f1c35b02c32e9bf2d14d84da017076bd8c66a7185d4de32baf7
ed94e4340621581cec927c362247b765e8eec9946069d54c36cac2e7ce1236f7
76a1146953eeb963c6eae47e2c22729d21199ef5d5e2d68f09bee651792d89e7
6a5fb55dd9dff7b874d54775cc1c1c9dfba6d99665d21a3630a1958c0ba7a547
96b4dc68d491b25769c36f74ad0403c1e775cd4c02b7859941267f40d1834419
cc74dce37e3eb30eb01e92d8413871cfbbf614e12730af6f8dc0f55cadb11aa6
29205d95468e39eb69b47f1bbec3c93411003098765e5b2af4adeab341dc24a0
cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67
7fe8eb1d71fbf75851d70673fa7e5d90c95c643437be3b5b0a7e104439263684
ee4be32b511a342b4a82953fdd12d66d042342b28b508ba4612dddef54b7d3c5
5bad9df94dcc60bb8e5c4137f2d1026c84787aed707ec9e95f5e6f05e70e290b
0812c989fb4ccd9ecc95deacd727da799b88ae487e0edd4dcee900429a420065
b43ad962fd2871e8d704ed4b44f719dee7793e90387563292fe48744d86a4e54
0bbc0a1fa2a101549dc68f2a9c087b5c9ce88957163a83425457a88fbfc4c1de
fc657851d2b6c7d93e46364069b6a96e8f1b927b9e6e9a8066aaf51060a957f8
49b3a5b9adc10281015d59ca3b9439cd1201712133895cb848d33c66c8fbb1bc
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
cefa40083339d42320bc1f9ba33c578b8abe47e15eb0dd6b0ba2f734aa8f3d6d
86f02fd88dc04b311ec6ae30fc2e4fc8be6884f24654a5103b7fb85f7631f99c
c52ce3f8d1b53883d52c55a97e6d33cb52a85725bb8edfb9f0e043f3b45a53a6
57be4ec7980a2d28a02541067688d47feecf59e71fdb022aa93fe84c04429c55
b51175581d84bf44fdbadff6a71ecc7c4cec821be778d0cbc7eb9a6417e8ff96
579c7148f42c09b133fa616244cb4497034adf370f8e724bd1a9afdd0c7e004d
fd2bd6b337113729beeb74f7446d2b777315abca4d557a5cfd7acd679add2d65
6d524f19183002c058639b24455f309f78f225ee0a0210cfd820b83609f132ad
3f2a538487752f1c35b02c32e9bf2d14d84da017076bd8c66a7185d4de32baf7
ed94e4340621581cec927c362247b765e8eec9946069d54c36cac2e7ce1236f7
76a1146953eeb963c6eae47e2c22729d21199ef5d5e2d68f09bee651792d89e7
6a5fb55dd9dff7b874d54775cc1c1c9dfba6d99665d21a3630a1958c0ba7a547
96b4dc68d491b25769c36f74ad0403c1e775cd4c02b7859941267f40d1834419
cc74dce37e3eb30eb01e92d8413871cfbbf614e12730af6f8dc0f55cadb11aa6
29205d95468e39eb69b47f1bbec3c93411003098765e5b2af4adeab341dc24a0
cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67
7fe8eb1d71fbf75851d70673fa7e5d90c95c643437be3b5b0a7e104439263684
ee4be32b511a342b4a82953fdd12d66d042342b28b508ba4612dddef54b7d3c5
5bad9df94dcc60bb8e5c4137f2d1026c84787aed707ec9e95f5e6f05e70e290b
0812c989fb4ccd9ecc95deacd727da799b88ae487e0edd4dcee900429a420065
b43ad962fd2871e8d704ed4b44f719dee7793e90387563292fe48744d86a4e54
0bbc0a1fa2a101549dc68f2a9c087b5c9ce88957163a83425457a88fbfc4c1de
fc657851d2b6c7d93e46364069b6a96e8f1b927b9e6e9a8066aaf51060a957f8
49b3a5b9adc10281015d59ca3b9439cd1201712133895cb848d33c66c8fbb1bc
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
cefa40083339d42320bc1f9ba33c578b8abe47e15eb0dd6b0ba2f734aa8f3d6d
86f02fd88dc04b311ec6ae30fc2e4fc8be6884f24654a5103b7fb85f7631f99c
c52ce3f8d1b53883d52c55a97e6d33cb52a85725bb8edfb9f0e043f3b45a53a6
57be4ec7980a2d28a02541067688d47feecf59e71fdb022aa93fe84c04429c55
SH256 hash:
579c7148f42c09b133fa616244cb4497034adf370f8e724bd1a9afdd0c7e004d
MD5 hash:
043b35de131306c1ede0fe6117551c60
SHA1 hash:
d2283e04226200cf6dd206c91363f7a1d99d3a55
Detections:
win_samsam_auto
MAL_Malware_Imphash_Mar23_1
SUSP_OBF_NET_Reactor_Native_Stub_Jan24
Parent samples :
6bfb0f467d70e67c4d5406c39a7b4ce5ce0b81b0c8318d51a078b77bddcdd275
b51175581d84bf44fdbadff6a71ecc7c4cec821be778d0cbc7eb9a6417e8ff96
579c7148f42c09b133fa616244cb4497034adf370f8e724bd1a9afdd0c7e004d
fd2bd6b337113729beeb74f7446d2b777315abca4d557a5cfd7acd679add2d65
6d524f19183002c058639b24455f309f78f225ee0a0210cfd820b83609f132ad
3f2a538487752f1c35b02c32e9bf2d14d84da017076bd8c66a7185d4de32baf7
ed94e4340621581cec927c362247b765e8eec9946069d54c36cac2e7ce1236f7
76a1146953eeb963c6eae47e2c22729d21199ef5d5e2d68f09bee651792d89e7
6a5fb55dd9dff7b874d54775cc1c1c9dfba6d99665d21a3630a1958c0ba7a547
96b4dc68d491b25769c36f74ad0403c1e775cd4c02b7859941267f40d1834419
cc74dce37e3eb30eb01e92d8413871cfbbf614e12730af6f8dc0f55cadb11aa6
29205d95468e39eb69b47f1bbec3c93411003098765e5b2af4adeab341dc24a0
cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67
7fe8eb1d71fbf75851d70673fa7e5d90c95c643437be3b5b0a7e104439263684
ee4be32b511a342b4a82953fdd12d66d042342b28b508ba4612dddef54b7d3c5
5bad9df94dcc60bb8e5c4137f2d1026c84787aed707ec9e95f5e6f05e70e290b
0812c989fb4ccd9ecc95deacd727da799b88ae487e0edd4dcee900429a420065
b43ad962fd2871e8d704ed4b44f719dee7793e90387563292fe48744d86a4e54
0bbc0a1fa2a101549dc68f2a9c087b5c9ce88957163a83425457a88fbfc4c1de
fc657851d2b6c7d93e46364069b6a96e8f1b927b9e6e9a8066aaf51060a957f8
49b3a5b9adc10281015d59ca3b9439cd1201712133895cb848d33c66c8fbb1bc
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
cefa40083339d42320bc1f9ba33c578b8abe47e15eb0dd6b0ba2f734aa8f3d6d
86f02fd88dc04b311ec6ae30fc2e4fc8be6884f24654a5103b7fb85f7631f99c
c52ce3f8d1b53883d52c55a97e6d33cb52a85725bb8edfb9f0e043f3b45a53a6
57be4ec7980a2d28a02541067688d47feecf59e71fdb022aa93fe84c04429c55
b51175581d84bf44fdbadff6a71ecc7c4cec821be778d0cbc7eb9a6417e8ff96
579c7148f42c09b133fa616244cb4497034adf370f8e724bd1a9afdd0c7e004d
fd2bd6b337113729beeb74f7446d2b777315abca4d557a5cfd7acd679add2d65
6d524f19183002c058639b24455f309f78f225ee0a0210cfd820b83609f132ad
3f2a538487752f1c35b02c32e9bf2d14d84da017076bd8c66a7185d4de32baf7
ed94e4340621581cec927c362247b765e8eec9946069d54c36cac2e7ce1236f7
76a1146953eeb963c6eae47e2c22729d21199ef5d5e2d68f09bee651792d89e7
6a5fb55dd9dff7b874d54775cc1c1c9dfba6d99665d21a3630a1958c0ba7a547
96b4dc68d491b25769c36f74ad0403c1e775cd4c02b7859941267f40d1834419
cc74dce37e3eb30eb01e92d8413871cfbbf614e12730af6f8dc0f55cadb11aa6
29205d95468e39eb69b47f1bbec3c93411003098765e5b2af4adeab341dc24a0
cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67
7fe8eb1d71fbf75851d70673fa7e5d90c95c643437be3b5b0a7e104439263684
ee4be32b511a342b4a82953fdd12d66d042342b28b508ba4612dddef54b7d3c5
5bad9df94dcc60bb8e5c4137f2d1026c84787aed707ec9e95f5e6f05e70e290b
0812c989fb4ccd9ecc95deacd727da799b88ae487e0edd4dcee900429a420065
b43ad962fd2871e8d704ed4b44f719dee7793e90387563292fe48744d86a4e54
0bbc0a1fa2a101549dc68f2a9c087b5c9ce88957163a83425457a88fbfc4c1de
fc657851d2b6c7d93e46364069b6a96e8f1b927b9e6e9a8066aaf51060a957f8
49b3a5b9adc10281015d59ca3b9439cd1201712133895cb848d33c66c8fbb1bc
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
cefa40083339d42320bc1f9ba33c578b8abe47e15eb0dd6b0ba2f734aa8f3d6d
86f02fd88dc04b311ec6ae30fc2e4fc8be6884f24654a5103b7fb85f7631f99c
c52ce3f8d1b53883d52c55a97e6d33cb52a85725bb8edfb9f0e043f3b45a53a6
57be4ec7980a2d28a02541067688d47feecf59e71fdb022aa93fe84c04429c55
SH256 hash:
cafdcfc0ee408a001adca96acdfc8192ca25f26dba266e4c4d6c35cd6bc0df67
MD5 hash:
81bc0f1492f7300d467bee66e60d3fbd
SHA1 hash:
eb202190e18a2c647a1972549b9a74544ca2e94f
Detections:
AutoIT_Compiled
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.DLL::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.DLL::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::TerminateProcess KERNEL32.DLL::SetSystemPowerState KERNEL32.DLL::LoadLibraryA KERNEL32.DLL::LoadLibraryW KERNEL32.DLL::LoadLibraryExW KERNEL32.DLL::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.DLL::WriteConsoleW KERNEL32.DLL::ReadConsoleW KERNEL32.DLL::SetStdHandle KERNEL32.DLL::GetConsoleCP KERNEL32.DLL::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.DLL::CopyFileExW KERNEL32.DLL::CopyFileW KERNEL32.DLL::CreateDirectoryW KERNEL32.DLL::CreateHardLinkW KERNEL32.DLL::CreateFileW IPHLPAPI.DLL::IcmpCreateFile |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.DLL::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.