AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
Static task
static1
Behavioral task
behavioral1
Sample
fc27aeaeae5f3220f3a56b0704deb368f5cd6887db342d68a056343b34848d70.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fc27aeaeae5f3220f3a56b0704deb368f5cd6887db342d68a056343b34848d70.dll
Resource
win10v2004-20220901-en
Target
fc27aeaeae5f3220f3a56b0704deb368f5cd6887db342d68a056343b34848d70
Size
9KB
MD5
07fc99c22490679afbdfaefea3dfb387
SHA1
1dcf406936b40389c4b35380d1150b6f13eeb9df
SHA256
fc27aeaeae5f3220f3a56b0704deb368f5cd6887db342d68a056343b34848d70
SHA512
2cf063f1d6f59f949c2f42fd972a827ae646eb90fac3929ecde96d2ebb65f653a247814f950e2f7a18cb711602816e3d5913ddff506c08bdbe7be29c749def3b
SSDEEP
192:V+x9CMeo/c+c3WGkJ5YDKCMQPwHJTg7rd25UN8Q3z:oxAMeo/cL3WGk6yUtA0Xz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateDirectoryW
CreateFileA
CreateProcessA
CreateThread
ExitProcess
FreeLibraryAndExitThread
GetModuleFileNameA
GetProcAddress
GetShortPathNameA
LoadLibraryA
OpenEventA
Sleep
TerminateThread
VirtualAlloc
VirtualProtect
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
lstrlenW
DefWindowProcW
FindWindowW
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
wsprintfA
CloseServiceHandle
ControlService
DeleteService
OpenSCManagerA
OpenServiceA
WSASocketA
closesocket
connect
gethostbyname
ioctlsocket
ntohs
recv
select
send
setsockopt
socket
InternetConnectA
WinVerifyTrust
ShellExecuteA
StrRChrA
IcmpCloseHandle
IcmpCreateFile
IcmpSendEcho
AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE