InfEngInstallINFFile
InfEngUnInstallINFFile
_InfEngUnInstallINFFile_RunDLL@16
Static task
static1
Behavioral task
behavioral1
Sample
faa938dae40b0eeb7661a44c297e7b737b959e82f6b675fc3534376f01fa1064.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
faa938dae40b0eeb7661a44c297e7b737b959e82f6b675fc3534376f01fa1064.dll
Resource
win10v2004-20220812-en
Target
faa938dae40b0eeb7661a44c297e7b737b959e82f6b675fc3534376f01fa1064
Size
392KB
MD5
748750a40bf14b29abbc6ba6be940c49
SHA1
b33b1c15ff6cbb28a9e0031cbfb7087b3a684cee
SHA256
faa938dae40b0eeb7661a44c297e7b737b959e82f6b675fc3534376f01fa1064
SHA512
47d9b018be0e3a9d544c81c76353c5acddf83f77f400965d43aef499f8ea12f09e73c2ae5589719ee9bac98db082aa45c4f6fb6e2146b0c1414c9a93887abb06
SSDEEP
6144:o8a/rxGy635QK8tJshATjcCmUOXGq9G05AL+FSmZ+Fdg+LZ:Fa/1eNAsM4kg9rawZ+Fd7LZ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateEventA
TlsGetValue
GetCurrentProcess
FreeResource
LockResource
LoadResource
FindResourceExA
WriteFile
TlsSetValue
WaitForSingleObject
ExitThread
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetConsoleCtrlHandler
TlsFree
LCMapStringA
GetTimeZoneInformation
OpenFile
VirtualProtect
GetOEMCP
GetACP
UnhandledExceptionFilter
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetCPInfo
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
FlushFileBuffers
SetEndOfFile
SetEvent
LCMapStringW
TlsAlloc
SetStdHandle
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FindFirstFileA
FindNextFileA
CreateDirectoryA
CopyFileA
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpynW
CreateDirectoryW
GetWindowsDirectoryW
lstrcatW
CopyFileW
GetPrivateProfileStringW
lstrcpyW
GetLocaleInfoA
MultiByteToWideChar
lstrlenW
MoveFileExA
GetShortPathNameA
RemoveDirectoryA
GetLastError
GetCurrentThreadId
GetVersionExA
GetModuleFileNameA
CreateProcessA
CloseHandle
TerminateProcess
Sleep
CreateFileA
GetSystemDirectoryA
WritePrivateProfileStringA
GetWindowsDirectoryA
SetFileAttributesA
FreeEnvironmentStringsA
HeapSize
DeleteFileA
lstrcatA
lstrcpyA
lstrcpynA
GetPrivateProfileStringA
GetSystemInfo
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
HeapAlloc
HeapFree
GetCommandLineA
GetProcessHeap
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
ReadFile
InterlockedExchange
VirtualQuery
SetUnhandledExceptionFilter
SetLastError
GetCurrentThread
GetModuleHandleA
FatalAppExitA
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
HeapDestroy
HeapCreate
ExitProcess
GetSystemTimeAsFileTime
wsprintfA
DialogBoxParamA
WinHelpA
GetWindowRect
GetSystemMetrics
MoveWindow
EndDialog
GetDesktopWindow
LoadIconA
GetDC
ReleaseDC
GetDlgItem
GetClientRect
SetFocus
SetWindowTextA
EnableWindow
ExitWindowsEx
CharLowerA
SendMessageA
IsWindowVisible
MessageBoxA
wsprintfW
CharUpperW
CharUpperA
EnumThreadWindows
MsgWaitForMultipleObjects
GetWindowTextA
PostMessageA
GetTextExtentPoint32A
DeleteObject
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegEnumKeyExA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumValueA
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegCreateKeyExA
FreeSid
ChangeServiceConfigA
RegOpenKeyW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
OpenSCManagerA
OpenServiceA
ControlService
QueryServiceStatus
LockServiceDatabase
DeleteService
UnlockServiceDatabase
CloseServiceHandle
RegDeleteKeyA
RegCreateKeyA
RegDeleteValueA
RegSetValueExA
StringFromGUID2
ImageList_Create
ImageList_Destroy
ord17
ImageList_ReplaceIcon
PropertySheetA
InfEngInstallINFFile
InfEngUnInstallINFFile
_InfEngUnInstallINFFile_RunDLL@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE