CrashForException
DumpProcess
DumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
Static task
static1
Behavioral task
behavioral1
Sample
1929de2793e9ad08995cd89227d9c73adb509fd895ad1744c4c81eed0255c324.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1929de2793e9ad08995cd89227d9c73adb509fd895ad1744c4c81eed0255c324.exe
Resource
win10v2004-20220812-en
Target
1929de2793e9ad08995cd89227d9c73adb509fd895ad1744c4c81eed0255c324
Size
1.3MB
MD5
e99e6f7656af496184ed41afc1d1210d
SHA1
3edd8fb71bbc0580ce51b5e7412a17c28cf7d963
SHA256
1929de2793e9ad08995cd89227d9c73adb509fd895ad1744c4c81eed0255c324
SHA512
a2e21e99ff7ac973820913ac970303c1c14343ffdceaeb0f09766d5857379616a5c6538630575be6cb02af2bbe41ee42e80e31e3dca4c335663465e1c9f99426
SSDEEP
24576:DKpSanFAmywe72KOrNd9sQpMlIGvOJYhc2aj4QKPU9r1ST57dW:RanmmyP72KOxd9sQpMHOJYnaj4QKP0rW
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathFileExistsW
PathRemoveFileSpecW
InitializeCriticalSection
TerminateJobObject
SetEvent
GetQueuedCompletionStatus
ResetEvent
DuplicateHandle
GetCurrentThreadId
CreateThread
CreateEventW
CreateIoCompletionPort
DeleteCriticalSection
PostQueuedCompletionStatus
InterlockedExchange
SignalObjectAndWait
SetHandleInformation
GetProcessHandleCount
VirtualFree
LocalFree
ResumeThread
FreeLibrary
LoadLibraryW
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
VirtualAllocEx
VirtualQueryEx
GetExitCodeProcess
GetThreadContext
AssignProcessToJobObject
InterlockedIncrement
InterlockedDecrement
UnregisterWaitEx
RegisterWaitForSingleObject
VirtualFreeEx
VirtualProtectEx
CreateFileW
GetLongPathNameW
GetFileAttributesW
QueryDosDeviceW
CreateJobObjectW
CreateMutexW
GetCurrentProcessId
CreateNamedPipeW
OpenEventW
SearchPathW
GetCurrentDirectoryW
DebugBreak
lstrlenW
VirtualQuery
ReadProcessMemory
SuspendThread
ReleaseSemaphore
RtlCaptureContext
CreateSemaphoreW
WaitNamedPipeW
WaitForMultipleObjects
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
ExpandEnvironmentStringsW
SetEnvironmentVariableW
GetUserDefaultLangID
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
SetFilePointer
FormatMessageA
ReleaseMutex
WideCharToMultiByte
MultiByteToWideChar
GetNativeSystemInfo
GetVersionExW
RaiseException
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
InterlockedExchangeAdd
TlsGetValue
GetLastError
TlsAlloc
TlsFree
ReadFile
GetStdHandle
GetSystemInfo
RtlCaptureStackBackTrace
VirtualAlloc
SizeofResource
LockResource
LoadResource
FindResourceW
GetFileTime
WTSGetActiveConsoleSessionId
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
LoadLibraryA
HeapAlloc
GetConsoleCP
GetConsoleMode
HeapReAlloc
SetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetCPInfo
RtlUnwind
GetStringTypeW
HeapCreate
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
UnmapViewOfFile
GetWindowsDirectoryW
GetSystemDirectoryW
GetUserDefaultUILanguage
SetLastError
WaitForSingleObject
SetInformationJobObject
LeaveCriticalSection
EnterCriticalSection
GetTickCount
GetModuleHandleW
SetEndOfFile
LocalAlloc
GetProcessHeap
GetThreadLocale
GetModuleHandleA
SetCurrentDirectoryW
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
GetTempPathW
GetEnvironmentVariableW
GetCommandLineW
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
TlsSetValue
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
CloseWindowStation
CharUpperW
MessageBoxW
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQueryUserToken
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
timeGetTime
InitializeSecurityDescriptor
LookupPrivilegeValueW
GetTokenInformation
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
RegCreateKeyExW
OpenProcessToken
CreateProcessAsUserW
SetThreadToken
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
SetSecurityDescriptorDacl
RevertToSelf
RegDisablePredefinedCache
RegOpenKeyExW
RegCloseKey
CreateWellKnownSid
GetSecurityInfo
SetEntriesInAclW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
ConvertSidToStringSidW
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
UnregisterTraceGuids
GetTraceEnableLevel
RegisterTraceGuidsW
SetFileSecurityW
ConvertSecurityDescriptorToStringSecurityDescriptorW
GetFileSecurityW
CopySid
CrashForException
DumpProcess
DumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE