CoGetComCatalog
GetRPCSSInfo
INS
ServiceMain
WhichService
Static task
static1
Behavioral task
behavioral1
Sample
833c4e11701d49c6fb82d8622ab85f1277f3920ce5563aa431d6419e5425dadf.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
833c4e11701d49c6fb82d8622ab85f1277f3920ce5563aa431d6419e5425dadf.dll
Resource
win10v2004-20220812-en
Target
833c4e11701d49c6fb82d8622ab85f1277f3920ce5563aa431d6419e5425dadf
Size
26KB
MD5
0635e595a79a546a6a64ddf0fa298dbc
SHA1
19f956c0d1e61d654ae56c7003f8dd6fab972f18
SHA256
833c4e11701d49c6fb82d8622ab85f1277f3920ce5563aa431d6419e5425dadf
SHA512
d7d392f3789fae8373a7785d2439318015f7d85a98ba844586919246fbdfe33bf0d97c3ce43e433f1f3d84ce02c821001301a103ddcd3a36531174383e0f3d0d
SSDEEP
384:D5OpdYD8yGdAfcrUiwKQ35ubuouqgTbP351:tOXC8ySAf0UiwKs5I0P351
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WriteFile
CreateFileA
LoadResource
SizeofResource
FindResourceA
lstrlenA
GetSystemDirectoryA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
FindFirstFileA
MultiByteToWideChar
SetFileTime
GetFileTime
WaitForSingleObject
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
LoadLibraryA
GetProcAddress
lstrcmpA
GetModuleFileNameA
wsprintfA
LookupPrivilegeValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
OpenProcessToken
PathFileExistsA
StrStrIA
memset
CoGetComCatalog
GetRPCSSInfo
INS
ServiceMain
WhichService
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ