ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetCrashKeyValueImpl
Static task
static1
Behavioral task
behavioral1
Sample
d89719e1a3fbea2b45a79a5db7f34a3ea934fa63fd5127b60df12d55cafdc34d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d89719e1a3fbea2b45a79a5db7f34a3ea934fa63fd5127b60df12d55cafdc34d.exe
Resource
win10v2004-20220812-en
Target
d89719e1a3fbea2b45a79a5db7f34a3ea934fa63fd5127b60df12d55cafdc34d
Size
966KB
MD5
6ac266b0cebe5278c3a22ad394f56fe0
SHA1
80480a931b0e2a4cc72cb3b9a8e39fcb10dcb6ed
SHA256
d89719e1a3fbea2b45a79a5db7f34a3ea934fa63fd5127b60df12d55cafdc34d
SHA512
0d4590398e47abc2df9c8b94cb7f025bbfdd192cd21dbad0ee28995b4504ee7e301c4e9a384ff07f2c80202dea971c60915346d4d8b180f66a2d27ddd61510db
SSDEEP
24576:sB7UZWysCkMnT3RCRNdiZf0GV33UTdljkx:sGXFDT3cNgZfDVHHx
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PathRemoveFileSpecW
GetExitCodeProcess
WaitForSingleObject
DuplicateHandle
GetCurrentProcess
InterlockedCompareExchange
SizeofResource
LockResource
LoadResource
FindResourceW
VirtualFree
SetFilePointer
ReadFile
GetSystemInfo
FreeLibrary
VirtualAlloc
CreateFileW
SetEnvironmentVariableW
GetEnvironmentVariableW
CreateEventW
ExpandEnvironmentStringsW
ReleaseMutex
GetLastError
SetLastError
CreateProcessW
CreateMutexW
WriteFile
FormatMessageA
GetModuleHandleA
LocalFree
GetUserDefaultLangID
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
GetFileAttributesW
CreateDirectoryW
GetTempPathW
GetLongPathNameW
GetCurrentDirectoryW
QueryDosDeviceW
MapViewOfFile
CreateFileMappingW
GetProcessTimes
LocalAlloc
OpenProcess
GetProcessId
GetNativeSystemInfo
GetVersionExW
SetInformationJobObject
ResumeThread
AssignProcessToJobObject
GetStdHandle
SetHandleInformation
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDirectoryW
GetWindowsDirectoryW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrlenW
IsDebuggerPresent
RaiseException
Sleep
CreateThread
InterlockedExchange
HeapSetInformation
SetEndOfFile
FlushFileBuffers
TerminateProcess
GetModuleHandleExW
SetUnhandledExceptionFilter
UnregisterWaitEx
RegisterWaitForSingleObject
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
InterlockedIncrement
GetQueuedCompletionStatus
CreateIoCompletionPort
PostQueuedCompletionStatus
ResetEvent
WaitForMultipleObjects
CreateRemoteThread
VirtualFreeEx
VirtualAllocEx
VirtualProtect
FormatMessageW
VirtualQueryEx
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
InitializeCriticalSection
SignalObjectAndWait
GetProcessHandleCount
GetThreadContext
GetFileType
InterlockedDecrement
CreateJobObjectW
CreateNamedPipeW
ProcessIdToSessionId
SearchPathW
DebugBreak
ReadProcessMemory
SuspendThread
GetComputerNameExW
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
GetFullPathNameW
HeapAlloc
GetProcessHeap
HeapReAlloc
SetStdHandle
RtlUnwind
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetTimeZoneInformation
WriteConsoleW
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
GetDriveTypeW
GetModuleHandleW
OutputDebugStringA
CloseHandle
LoadLibraryA
ReleaseSemaphore
RtlCaptureContext
CreateSemaphoreW
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
SetCurrentDirectoryW
LoadLibraryExW
GetModuleFileNameW
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
GetTickCount
GetCurrentProcessId
InterlockedExchangeAdd
GetCurrentThreadId
SetEvent
CreateWellKnownSid
CopySid
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RevertToSelf
RegDisablePredefinedCache
CreateProcessAsUserW
RegSetValueExA
ConvertSidToStringSidW
OpenProcessToken
GetTokenInformation
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
GetUserNameW
SetEntriesInAclW
GetSecurityInfo
SetThreadToken
RegQueryValueExW
RegSetValueExW
IsWindow
SendMessageTimeoutW
AllowSetForegroundWindow
GetWindowThreadProcessId
CharUpperW
FindWindowExW
wsprintfW
CloseWindowStation
CloseDesktop
CreateWindowStationW
GetProcessWindowStation
CreateDesktopW
SetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
MessageBoxW
GetAsyncKeyState
GetProfileType
WTSQuerySessionInformationW
WTSFreeMemory
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeGetTime
ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetCrashKeyValueImpl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE