AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
Static task
static1
Behavioral task
behavioral1
Sample
bca2c49edbae9b3abb7a0980a4e8186c701ea037e955f03a2e8303371123bf1f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bca2c49edbae9b3abb7a0980a4e8186c701ea037e955f03a2e8303371123bf1f.dll
Resource
win10v2004-20220812-en
Target
bca2c49edbae9b3abb7a0980a4e8186c701ea037e955f03a2e8303371123bf1f
Size
11KB
MD5
11959f98e39d253931b4e0bf44e85936
SHA1
8c5e02b1b979c90bdf80d3e4c6d600b1e4880cda
SHA256
bca2c49edbae9b3abb7a0980a4e8186c701ea037e955f03a2e8303371123bf1f
SHA512
1e681df90628ca20dde332ab320b2d2883a2fe6ec04c0957e5a6ad6e1a90e1a835a37d15a0d9eeb861144d4d1b7aee43f65c9da92b21894a3c9904b094e0fe7a
SSDEEP
192:NNF8yR+PbIvzRZPDf+OIZlNnmH2Mw5iNbgxNs4eC:d8q+PQzRZPDf+Oc1O9NbgxNaC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateDirectoryW
CreateThread
ExitProcess
ExitThread
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
LoadLibraryA
MoveFileExA
RemoveDirectoryA
Sleep
VirtualProtect
lstrcatA
lstrcmpA
lstrlenW
RtlZeroMemory
GlobalFree
RtlAdjustPrivilege
SHGetFolderPathA
ShellExecuteA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetReadFile
HttpOpenRequestA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
ExitWindowsEx
ShowWindow
SetWindowTextW
SetWindowLongA
SendMessageA
GetCursorPos
GetAsyncKeyState
CallWindowProcA
CreateDialogParamA
CreateDialogParamW
FindWindowW
WinVerifyTrust
AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ