CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
tttt
Static task
static1
Behavioral task
behavioral1
Sample
1c6edb44951b69ef3d0058acb650c03a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c6edb44951b69ef3d0058acb650c03a.dll
Resource
win10v2004-20231215-en
Target
1c6edb44951b69ef3d0058acb650c03a
Size
27KB
MD5
1c6edb44951b69ef3d0058acb650c03a
SHA1
307759db86699064e49e61ee42be37841b47bc88
SHA256
c10d67ebaeeea80e2a0cb268093a94f9db17d3b017b907af9934c9d520e59300
SHA512
419410524f48dd460588ab498aed726a122b1777e35a432026487aa6a16af9c1c4f9f65a57c745f3ff416e06bb8b9b33d2d36bf2ed5806a2741a864301c204d7
SSDEEP
384:Jt3x2xRplGg13x2xQfcNUi/Yzixt+oBUb0d+nW9u7PqS1:CbGgnfWUi2lg+nWUDn1
Checks for missing Authenticode signature.
resource |
---|
1c6edb44951b69ef3d0058acb650c03a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadResource
SizeofResource
GetModuleHandleA
lstrlenA
GetSystemDirectoryA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
WriteFile
MultiByteToWideChar
SetFileTime
GetFileTime
WaitForSingleObject
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
LoadLibraryA
GetProcAddress
FindFirstFileA
GetModuleFileNameA
wsprintfA
CreateFontIndirectA
LookupPrivilegeValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
OpenProcessToken
StrStrIA
PathFileExistsA
memset
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
tttt
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ