Clear
FileEx
GetImporter
RestoreThread
free_default
Static task
static1
Behavioral task
behavioral1
Sample
87b04ec09594afe79ec7fbd6e7e53642d69aa1989a8f340ba3a152b3b1bc87ae.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
87b04ec09594afe79ec7fbd6e7e53642d69aa1989a8f340ba3a152b3b1bc87ae.dll
Resource
win10v2004-20221111-en
Target
87b04ec09594afe79ec7fbd6e7e53642d69aa1989a8f340ba3a152b3b1bc87ae
Size
279KB
MD5
825553c27b8e0286a6b9ba9c867fb3c0
SHA1
d2c0e6028c3ac68962e494b05b565f6d976927f8
SHA256
87b04ec09594afe79ec7fbd6e7e53642d69aa1989a8f340ba3a152b3b1bc87ae
SHA512
eb3ecebf044499f59c88798938366ce96396c688ac97053b99f9ee4b8ee6a01a37ce5dd713d718812bc8eefdf0a70fe8736b10cb069da380c7155cc82a78e8f8
SSDEEP
6144:JntTMTScdr5VHfYJ7F9TVy77pb/bHklDE8gBrn9:Jjc55BfYj9Wp7bqEF9
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHCreateDirectoryExW
PathAppendW
PathRemoveFileSpecW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
SetupGetStringFieldW
SetupFindNextLine
SetupFindFirstLineW
SetupDiSetDeviceInstallParamsW
SetupDiGetSelectedDriverW
SetupDiGetDeviceInstallParamsW
SetupCloseInfFile
WriteConsoleA
WriteConsoleW
WriteFile
GetLocalTime
WideCharToMultiByte
WaitForSingleObject
VirtualFree
VirtualAlloc
TerminateProcess
Sleep
SetStdHandle
SetLastError
SetHandleCount
CloseHandle
CreateFileA
CreateFileW
CreateMutexW
CreateProcessW
EnterCriticalSection
ExitProcess
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetExitCodeProcess
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersion
GetVersionExA
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
RtlUnwind
SetFilePointer
Clear
FileEx
GetImporter
RestoreThread
free_default
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ