ExecCodeModule
destroy_struct_2
set_IHDR
Static task
static1
Behavioral task
behavioral1
Sample
fd5d53de4bdc98aab5e673c8d014c83800e1746de6e7c7392dd62e4bb4d9ed61.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fd5d53de4bdc98aab5e673c8d014c83800e1746de6e7c7392dd62e4bb4d9ed61.dll
Resource
win10v2004-20221111-en
Target
fd5d53de4bdc98aab5e673c8d014c83800e1746de6e7c7392dd62e4bb4d9ed61
Size
596KB
MD5
f05e82f9f2689d0c27144b3732622ef1
SHA1
2cbd61837ee858889a585c8a9854e7ca0aba3f8d
SHA256
fd5d53de4bdc98aab5e673c8d014c83800e1746de6e7c7392dd62e4bb4d9ed61
SHA512
7f0087737c75ebf4e33b5b10603381a91569a7b417133f7137753c0cc8c339121ea1733a7c82516092e89f9cad230bff95cf089f4b6b561a9e567f41ff281c9e
SSDEEP
12288:SEvZKwKNzaJzEQpd47mhN7QVupqzLLtNxIOq05lZ:JAwK5EmmhNvqzPzxIz05lZ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetupOpenInfFileA
SetupGetLineTextA
SetupDiOpenDevRegKey
SetupDiGetSelectedDriverA
SetupDiGetDriverInfoDetailA
SetupDiCallClassInstaller
SetupCloseInfFile
DeleteAce
SystemFunction008
RevertToSelf
RegSetValueExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupAccountSidA
AccessCheck
CopySid
GetTokenInformation
LookupAccountNameA
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
lstrlenA
GetProcessHeap
VirtualFree
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateToolhelp32Snapshot
DeleteFileA
EnterCriticalSection
ExitProcess
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
GetSystemInfo
GetTickCount
GetUserDefaultLangID
GetWindowsDirectoryA
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
MultiByteToWideChar
OpenProcess
OutputDebugStringA
Process32First
Process32Next
QueryPerformanceCounter
RaiseException
RtlUnwind
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
Sleep
TerminateProcess
VirtualAlloc
ExecCodeModule
destroy_struct_2
set_IHDR
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ