CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
ins
Static task
static1
Behavioral task
behavioral1
Sample
0d89bb7b80815f03860349b9133be93ffac6f131f04d749d75b857deeb7c948d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0d89bb7b80815f03860349b9133be93ffac6f131f04d749d75b857deeb7c948d.dll
Resource
win10v2004-20220812-en
Target
0d89bb7b80815f03860349b9133be93ffac6f131f04d749d75b857deeb7c948d
Size
10KB
MD5
c61a75a7bf0c3bef4b2dced7f8d79f7f
SHA1
90c8fb0659eb6c91b9c3f16a687ab8a60ea54ae5
SHA256
0d89bb7b80815f03860349b9133be93ffac6f131f04d749d75b857deeb7c948d
SHA512
8a336e73b04a13a76f0bdf46113c20e6292d131ac390ecf753ae3a65e70c4a00c0b33faaed34ac69dd15b1c1a1032d3d68a07ac602b1fb57f2cd52624c7208e9
SSDEEP
192:pn6+HxpIdV+qLchnpoxXCHZnvfdaHs7Uiw:pnpp/K1sZnvfcqUiw
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WriteFile
CreateFileA
LoadResource
SizeofResource
FindResourceA
lstrlenA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
FindClose
FindNextFileA
lstrcpynA
WaitForSingleObject
lstrcmpA
FindFirstFileA
MultiByteToWideChar
SetFileTime
GetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
LoadLibraryA
GetProcAddress
lstrcpyA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
StrStrIA
PathFileExistsA
strcpy
strstr
strncat
strcat
memset
sprintf
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
ins
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ