CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
ins
Static task
static1
Behavioral task
behavioral1
Sample
b2d7dceab4cf8fa48beaefc144e16f6cd23addf98d09722afc9497015575d349.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2d7dceab4cf8fa48beaefc144e16f6cd23addf98d09722afc9497015575d349.dll
Resource
win10v2004-20220812-en
Target
b2d7dceab4cf8fa48beaefc144e16f6cd23addf98d09722afc9497015575d349
Size
87KB
MD5
0e0fa9e5a1ff568e52ef6f0d8c04d111
SHA1
1ded3442bac59acd2e6375b3e6efef381e25591c
SHA256
b2d7dceab4cf8fa48beaefc144e16f6cd23addf98d09722afc9497015575d349
SHA512
9888ef0e5aa805e345838dc1045ba52c027921ca29a8440f0ce5a0f24c200b51e0272469a1ca87da62930789ce63ecd5e9af98e05c21cef6d520c24cb69595f3
SSDEEP
768:qkOyBNRfNUitZKoMMSvm7A6qScJRMlV7NoI5x:qkOybnUcXO3AFDz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WriteFile
CreateFileA
LoadResource
SizeofResource
FindResourceA
lstrlenA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
FindClose
FindNextFileA
lstrcpynA
WaitForSingleObject
lstrcmpA
FindFirstFileA
MultiByteToWideChar
SetFileTime
GetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
LoadLibraryA
GetProcAddress
lstrcpyA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
StrStrIA
PathFileExistsA
strcpy
strstr
strncat
strcat
memset
sprintf
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
ins
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ