AsDecodedObject
StringARepr
SystemError
destroy_struct_2
vGetFileA
write_end
Static task
static1
Behavioral task
behavioral1
Sample
f40b310b5d2cfe7623c0171474b2e9fb3b15b99e7f7a6a93594727bee12cadf4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f40b310b5d2cfe7623c0171474b2e9fb3b15b99e7f7a6a93594727bee12cadf4.dll
Resource
win10v2004-20220901-en
Target
f40b310b5d2cfe7623c0171474b2e9fb3b15b99e7f7a6a93594727bee12cadf4
Size
326KB
MD5
54dccc1357d686232d9266706047f3be
SHA1
1a1c999e50a60c7f72c10e1ef96c5755ec8a3255
SHA256
f40b310b5d2cfe7623c0171474b2e9fb3b15b99e7f7a6a93594727bee12cadf4
SHA512
1c1ffe8eee248c50106e135cc4647efb2b54d67a7d0e8ead8dcb5387fc007fb2526b89db503bb55b7585629e76522a8d24de23d9715938a6eb9a971e65cfc448
SSDEEP
6144:gVkGYLEyE0kWxN7BNLZo8x7Jb/KyCw0vzOQyusLcT8W:gVFYLEyE0rHb1oDy50Sg2C
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetupOpenInfFileA
SetupGetLineTextA
SetupDiSetClassInstallParamsA
SetupDiOpenDevRegKey
SetupDiGetSelectedDriverA
SetupDiGetDriverInfoDetailA
SetupDiCallClassInstaller
SetupCloseInfFile
EnterCriticalSection
ExitProcess
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentThreadId
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultLangID
GetWindowsDirectoryA
DeleteFileA
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
MultiByteToWideChar
OpenProcess
OutputDebugStringA
Process32First
Process32Next
QueryPerformanceCounter
RaiseException
RtlUnwind
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
Sleep
TerminateProcess
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
lstrlenA
CreateToolhelp32Snapshot
CreateProcessA
CreateFileA
CopyFileA
CloseHandle
HeapCreate
RevertToSelf
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
LsaICLookupNames
LookupAccountSidA
LookupAccountNameA
GetTokenInformation
GetOldestEventLogRecord
EqualSid
DuplicateToken
CopySid
ImpersonateLoggedOnUser
AsDecodedObject
StringARepr
SystemError
destroy_struct_2
vGetFileA
write_end
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ