ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
SetCrashKeyValueImpl
Static task
static1
Behavioral task
behavioral1
Sample
3936c79ba81e89157a46181f04dd6d4ccca64f98343b14171aebdd6b749cb9e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3936c79ba81e89157a46181f04dd6d4ccca64f98343b14171aebdd6b749cb9e1.exe
Resource
win10v2004-20220812-en
Target
3936c79ba81e89157a46181f04dd6d4ccca64f98343b14171aebdd6b749cb9e1
Size
1.0MB
MD5
96e5e870af18eb528748489e6cd87e00
SHA1
495313ad6cc13101af2c72aa57d0992708fc60cf
SHA256
3936c79ba81e89157a46181f04dd6d4ccca64f98343b14171aebdd6b749cb9e1
SHA512
ca006936338effe9f283f7b5b87b9b15e537ff39f300eb202d3a8712edef499c581810a4b21178e0efaa5b177d835c7d4f291b032c83fa0a374a826446842331
SSDEEP
24576:VTgul6FCa6yC6pe1Kl8YsaXXQtKno01Mm:WS6FlC6pe1Klp1nQknr
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
CreateFileW
SignalChromeElf
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeGetTime
PathRemoveFileSpecW
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleW
InterlockedCompareExchange
LoadResource
LockResource
SizeofResource
FindResourceW
ReadFile
SetFilePointer
CloseHandle
GetSystemInfo
VirtualAlloc
VirtualFree
LocalFree
CreateMutexW
CreateProcessW
FormatMessageA
WriteFile
SetLastError
ReleaseMutex
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
GetEnvironmentVariableW
SetEnvironmentVariableW
GetUserDefaultLangID
lstrlenW
IsDebuggerPresent
CreateEventW
ExpandEnvironmentStringsW
GetNativeSystemInfo
GetVersionExW
GetProcessTimes
LeaveCriticalSection
EnterCriticalSection
MapViewOfFile
CreateDirectoryW
GetFileAttributesW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
QueryDosDeviceW
SetEndOfFile
SetFilePointerEx
DeleteCriticalSection
SetInformationJobObject
GetCurrentProcess
SetHandleInformation
AssignProcessToJobObject
GetStdHandle
ResumeThread
GetLocaleInfoW
GetUserDefaultUILanguage
Sleep
GetCurrentThreadId
GetSystemDirectoryW
GetWindowsDirectoryW
OpenProcess
GetProcessId
HeapSetInformation
InterlockedExchange
TerminateProcess
GetModuleHandleExW
SetUnhandledExceptionFilter
RegisterWaitForSingleObject
UnregisterWaitEx
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
SetEvent
ResetEvent
WaitForMultipleObjects
WaitNamedPipeW
VirtualProtect
VirtualAllocEx
VirtualFreeEx
FormatMessageW
VirtualQueryEx
VirtualProtectEx
WriteProcessMemory
InitializeCriticalSection
TerminateJobObject
GetThreadContext
LoadLibraryW
GetFileType
InterlockedIncrement
InterlockedDecrement
GetProcessHandleCount
SignalObjectAndWait
CreateJobObjectW
CreateNamedPipeW
SearchPathW
ProcessIdToSessionId
ReadProcessMemory
SuspendThread
DebugBreak
GetComputerNameExW
DuplicateHandle
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetLastError
RaiseException
DecodePointer
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
SetCurrentDirectoryW
GetCommandLineW
SetEnvironmentVariableA
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
ReadConsoleW
OutputDebugStringW
GetDriveTypeW
RtlCaptureContext
ReleaseSemaphore
GetModuleHandleA
FreeLibrary
GetTickCount
GetCurrentProcessId
CreateThread
InterlockedExchangeAdd
SetNamedPipeHandleState
TransactNamedPipe
FlushFileBuffers
CreateRemoteThread
IsValidLocale
LCMapStringW
CompareStringW
CreateSemaphoreW
GetStartupInfoW
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetFullPathNameW
GetConsoleMode
GetConsoleCP
ExitProcess
IsProcessorFeaturePresent
EncodePointer
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryExA
SetEntriesInAclW
LookupPrivilegeValueW
EqualSid
DuplicateTokenEx
DuplicateToken
CreateRestrictedToken
CreateWellKnownSid
CopySid
GetSecurityInfo
SetSecurityInfo
SetTokenInformation
GetLengthSid
SetThreadToken
ConvertStringSidToSidW
RegDisablePredefinedCache
RevertToSelf
SystemFunction036
CreateProcessAsUserW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegEnumKeyExW
RegDeleteValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegSetValueExA
GetUserNameW
CloseDesktop
CreateDesktopW
GetThreadDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
CloseWindowStation
FindWindowExW
wsprintfW
MessageBoxW
CharUpperW
GetWindowThreadProcessId
AllowSetForegroundWindow
IsWindow
SendMessageTimeoutW
GetAsyncKeyState
GetProfileType
WTSFreeMemory
WTSQuerySessionInformationW
ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
SetCrashKeyValueImpl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ