InfEngInstallINFFile
InfEngUnInstallINFFile
_InfEngUnInstallINFFile_RunDLL@16
Static task
static1
Behavioral task
behavioral1
Sample
e058346cdd536e131ba004f62995135d73117c3db6e2128d7a69fef5403a52be.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e058346cdd536e131ba004f62995135d73117c3db6e2128d7a69fef5403a52be.dll
Resource
win10v2004-20220812-en
Target
e058346cdd536e131ba004f62995135d73117c3db6e2128d7a69fef5403a52be
Size
412KB
MD5
431f8c3628ef40ffceb6167f42fbb591
SHA1
2d512934f1fb1b67c6c168fe62234b527f59e52e
SHA256
e058346cdd536e131ba004f62995135d73117c3db6e2128d7a69fef5403a52be
SHA512
d29a10fb1c7301cc6f9ef221a8c9bc5ed6c59d195429f3dcb0ca5af7357af15d8074b415228a3c2e75a5166286519b4132ef1d040a0927afd37fd4273240137a
SSDEEP
6144:FCShmBEdr2eOIshARj8BXyzmU9XGy3Rx7T5YhAspaVA4jB1kkrtcB/ximIrJF:kgr3s2oBXyZJx5YhVoBSScCT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateEventA
TlsGetValue
GetCurrentProcess
FreeResource
LockResource
LoadResource
FindResourceExA
WriteFile
TlsSetValue
WaitForSingleObject
ExitThread
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetConsoleCtrlHandler
TlsFree
LCMapStringA
GetTimeZoneInformation
OpenFile
VirtualProtect
GetOEMCP
GetACP
UnhandledExceptionFilter
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetCPInfo
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
FlushFileBuffers
SetEndOfFile
SetEvent
LCMapStringW
TlsAlloc
SetStdHandle
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FindFirstFileA
FindNextFileA
CreateDirectoryA
CopyFileA
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpynW
CreateDirectoryW
GetWindowsDirectoryW
lstrcatW
CopyFileW
GetPrivateProfileStringW
lstrcpyW
GetLocaleInfoA
MultiByteToWideChar
lstrlenW
MoveFileExA
GetShortPathNameA
RemoveDirectoryA
GetLastError
GetCurrentThreadId
GetVersionExA
GetModuleFileNameA
CreateProcessA
CloseHandle
TerminateProcess
Sleep
CreateFileA
GetSystemDirectoryA
WritePrivateProfileStringA
GetWindowsDirectoryA
SetFileAttributesA
FreeEnvironmentStringsA
HeapSize
DeleteFileA
lstrcatA
lstrcpyA
lstrcpynA
GetPrivateProfileStringA
GetSystemInfo
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
HeapAlloc
HeapFree
GetCommandLineA
GetProcessHeap
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
ReadFile
InterlockedExchange
VirtualQuery
SetUnhandledExceptionFilter
SetLastError
GetCurrentThread
GetModuleHandleA
FatalAppExitA
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
HeapDestroy
HeapCreate
ExitProcess
GetSystemTimeAsFileTime
wsprintfA
DialogBoxParamA
WinHelpA
GetWindowRect
GetSystemMetrics
MoveWindow
EndDialog
GetDesktopWindow
LoadIconA
GetDC
ReleaseDC
GetDlgItem
GetClientRect
SetFocus
SetWindowTextA
EnableWindow
ExitWindowsEx
CharLowerA
SendMessageA
IsWindowVisible
MessageBoxA
wsprintfW
CharUpperW
CharUpperA
EnumThreadWindows
MsgWaitForMultipleObjects
GetWindowTextA
PostMessageA
GetTextExtentPoint32A
DeleteObject
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegEnumKeyExA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumValueA
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegCreateKeyExA
FreeSid
ChangeServiceConfigA
RegOpenKeyW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
OpenSCManagerA
OpenServiceA
ControlService
QueryServiceStatus
LockServiceDatabase
DeleteService
UnlockServiceDatabase
CloseServiceHandle
RegDeleteKeyA
RegCreateKeyA
RegDeleteValueA
RegSetValueExA
StringFromGUID2
ImageList_Create
ImageList_Destroy
ord17
ImageList_ReplaceIcon
PropertySheetA
InfEngInstallINFFile
InfEngUnInstallINFFile
_InfEngUnInstallINFFile_RunDLL@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE