AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
Static task
static1
Behavioral task
behavioral1
Sample
545a98589ca4e2146f22b845ae670d056b7b87d14247fcd401a1b77a2c14f0a1.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
545a98589ca4e2146f22b845ae670d056b7b87d14247fcd401a1b77a2c14f0a1.dll
Resource
win10v2004-20221111-en
Target
545a98589ca4e2146f22b845ae670d056b7b87d14247fcd401a1b77a2c14f0a1
Size
9KB
MD5
7ff05c8286ef8af9bd510432d0d7cee1
SHA1
170e33d229ae6be2c1a3fb233f8ee2e6cbf52b43
SHA256
545a98589ca4e2146f22b845ae670d056b7b87d14247fcd401a1b77a2c14f0a1
SHA512
eefd49e223b26a540ab813b673b946710aefb82aaa735bc0068d479b4a93c8055f207574754c4b0f6991955c1bc16d92cf8108e15bae4e19fd6e9cc1d7ca3b25
SSDEEP
192:ehBPIcgjqxL9DPezyiH4XCAVJPwHJTOHWxDhCRWQ:ehBgcgjqxL9jezZCCA+KB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateDirectoryW
CreateFileA
CreateProcessA
CreateThread
ExitProcess
FreeLibraryAndExitThread
GetCommandLineA
GetModuleFileNameA
GetProcAddress
GetShortPathNameA
LoadLibraryA
OpenEventA
RtlZeroMemory
Sleep
TerminateThread
VirtualAlloc
VirtualProtect
WaitForSingleObject
WinExec
WriteFile
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
lstrlenW
CallWindowProcA
CreateDialogParamW
FindWindowW
SetWindowLongA
SetWindowTextW
ShowWindow
wsprintfA
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
WSASocketA
closesocket
connect
gethostbyname
ioctlsocket
ntohs
recv
select
send
setsockopt
socket
InternetConnectA
WinVerifyTrust
ShellExecuteA
StrRChrA
IcmpCloseHandle
IcmpCreateFile
IcmpSendEcho
AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE