FromLong
GetFrame
Number_Check
set_gAMA
Static task
static1
Behavioral task
behavioral1
Sample
7e5bf4d194813b36d47424ceea844db5dd8c172ce984ee3dca5dc95715776292.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7e5bf4d194813b36d47424ceea844db5dd8c172ce984ee3dca5dc95715776292.dll
Resource
win10v2004-20220812-en
Target
7e5bf4d194813b36d47424ceea844db5dd8c172ce984ee3dca5dc95715776292
Size
546KB
MD5
f26e8e3afd3353b45e07d1098467c746
SHA1
98c941a8cea50c19a96580b2f535c38bd117c280
SHA256
7e5bf4d194813b36d47424ceea844db5dd8c172ce984ee3dca5dc95715776292
SHA512
00781fbfb68bdef38227fa078a081bdc3c3c751221f6bbdc536d2d597369782d01b7c015ad9adec307d00e8dba27e73ef03ec3624d3a05bfeaf568118453b6f0
SSDEEP
12288:42ybOGasVMqZmrXWM9i1SlNHF3WiEN6d:4NSGVzwrXpqMoUd
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetupOpenInfFileA
SetupGetLineTextA
SetupDiOpenDevRegKey
SetupDiGetSelectedDriverA
SetupDiGetDriverInfoDetailA
SetupDiCallClassInstaller
SetupCloseInfFile
DeleteAce
SystemFunction008
RevertToSelf
RegSetValueExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupAccountSidA
AccessCheck
CopySid
GetTokenInformation
LookupAccountNameA
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
lstrlenA
GetProcessHeap
VirtualFree
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateToolhelp32Snapshot
DeleteFileA
EnterCriticalSection
ExitProcess
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
GetSystemInfo
GetTickCount
GetUserDefaultLangID
GetWindowsDirectoryA
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
MultiByteToWideChar
OpenProcess
OutputDebugStringA
Process32First
Process32Next
QueryPerformanceCounter
RaiseException
RtlUnwind
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
Sleep
TerminateProcess
VirtualAlloc
FromLong
GetFrame
Number_Check
set_gAMA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ