AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
Static task
static1
Behavioral task
behavioral1
Sample
14b2034107cba13dfbdd586b852f46462ab65e9c41ba9d5db7d38d51c7bc7c6a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14b2034107cba13dfbdd586b852f46462ab65e9c41ba9d5db7d38d51c7bc7c6a.dll
Resource
win10v2004-20220812-en
Target
14b2034107cba13dfbdd586b852f46462ab65e9c41ba9d5db7d38d51c7bc7c6a
Size
18KB
MD5
6346efcb4e585e0cb96ae18ebcd62b60
SHA1
a18baf25d3579e5d3c5edbbfd0753c1ccfad84e3
SHA256
14b2034107cba13dfbdd586b852f46462ab65e9c41ba9d5db7d38d51c7bc7c6a
SHA512
04feb66fca3352c7fae2292f937e6f2962a4dbb2a2a14c736405a971ea83393b538b29c03d9fc0819bcbfe7b07f1a373fadc92b4d1c0d6809a19cff3e9187206
SSDEEP
384:p+QY43+pPOogbfYepcQWk3UbSaabct+owI3f:py43+pzgjYIcQWsGqs+tef
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateFileMappingA
CreateMutexA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
FindFirstFileA
FindNextFileA
FreeLibrary
GetFileSize
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetSystemDirectoryA
GetVolumeInformationA
HeapAlloc
HeapFree
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
MoveFileA
OpenFileMappingA
RemoveDirectoryA
ResetEvent
SearchPathA
SetEvent
SetFilePointer
Sleep
SleepEx
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpW
lstrcpyA
CreateDialogParamW
CreateWindowExW
DefWindowProcW
ExitWindowsEx
FindWindowW
GetAsyncKeyState
GetClassInfoExW
GetCursorPos
GetDlgItem
IsDialogMessageW
IsWindowVisible
KillTimer
RegisterClassExW
SendMessageA
SetLayeredWindowAttributes
SetTimer
SetWindowLongA
SetWindowTextW
ShowWindow
wsprintfA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
FtpCreateDirectoryA
FtpPutFileA
FtpSetCurrentDirectoryA
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetQueryDataAvailable
WinVerifyTrust
SHGetFolderPathA
ShellExecuteExA
StrRChrA
RtlAdjustPrivilege
AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE