CoCreateInstance
CoGetMalloc
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
GradientFill
Static task
static1
Behavioral task
behavioral1
Sample
64dc530f9d787fe0343797337bf45fefd19042963a5e8267614accf22cae2fbb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64dc530f9d787fe0343797337bf45fefd19042963a5e8267614accf22cae2fbb.exe
Resource
win10v2004-20220901-en
Target
64dc530f9d787fe0343797337bf45fefd19042963a5e8267614accf22cae2fbb
Size
88KB
MD5
908952acd7bd820127e82a38c2164c1b
SHA1
8c53cfbebf807122a3b0de4d0ebe14fd38e9d227
SHA256
64dc530f9d787fe0343797337bf45fefd19042963a5e8267614accf22cae2fbb
SHA512
37fcd62ff79d986a8d08e46f60030864a23f4e0874c5fccd22cac420729f7b4a3ab2eb8fee44a595af8e2f256cbace1d316de8e3c0d68b60d288ce41f9b81e3c
SSDEEP
1536:mw9ZKt+IXtihWhTD5qMdvBq6xCdylFExwJ4wiIvAl3xTAnzrpCzWzIj:59iXtihWhTDEivBq6xCdyNJRgl3IrpM
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrcatA
MultiByteToWideChar
lstrcmpiA
GetProcAddress
CopyFileA
LoadLibraryA
SetNamedPipeHandleState
GetModuleFileNameA
lstrcmpiW
GetModuleHandleA
VirtualProtect
GetVersionExA
GetTempPathA
lstrcpyW
DeleteFileA
lstrcpyA
GetFileSize
FindResourceA
FreeResource
SetEndOfFile
GetSystemDirectoryA
LoadResource
GetCurrentProcess
Process32First
GetSystemTimeAsFileTime
SizeofResource
GetExitCodeProcess
CreateProcessA
Process32Next
LockResource
CreateToolhelp32Snapshot
LocalFree
SetEvent
ExitThread
lstrlenW
OpenEventA
DuplicateHandle
GetCurrentProcessId
GetSystemTime
CreateThread
CreateEventA
Sleep
OpenProcess
GetCommandLineA
WaitForSingleObject
VirtualQuery
lstrlenA
ExitProcess
CloseHandle
DeviceIoControl
VirtualAlloc
GetLastError
ReadFile
WriteFile
VirtualFree
SetFilePointer
FreeLibrary
CreateFileA
FindWindowA
PostMessageA
SendMessageA
wsprintfW
wsprintfA
SetEntriesInAclA
RegCloseKey
RegOpenKeyA
ControlService
OpenSCManagerA
QueryServiceStatus
StartServiceA
CreateServiceA
RegQueryValueExA
CloseServiceHandle
OpenServiceA
SetNamedSecurityInfoA
LookupPrivilegeValueA
BuildExplicitAccessWithNameA
AdjustTokenPrivileges
GetNamedSecurityInfoA
OpenProcessToken
ShellExecuteA
SHDeleteKeyA
SHSetValueA
SHGetValueA
PathFileExistsA
SHDeleteValueA
GetModuleFileNameExA
_except_handler3
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
strtoul
strrchr
_access
strstr
memset
memcpy
CoCreateInstance
CoGetMalloc
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
GradientFill
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE