InitBugReport
SetBugReportUin
Static task
static1
Behavioral task
behavioral1
Sample
6debe0f3e9adb246650c8d8650901ca9e149d97f8be0e322ab06b39ee7e2cabc.dll
Resource
win7-20220812-en
Target
6debe0f3e9adb246650c8d8650901ca9e149d97f8be0e322ab06b39ee7e2cabc
Size
136KB
MD5
524d3a3f3ea15080934501bb9b0ad9c0
SHA1
c10d2b81655fa40d83a61d334bab7752f788ca4e
SHA256
6debe0f3e9adb246650c8d8650901ca9e149d97f8be0e322ab06b39ee7e2cabc
SHA512
d762fa918bbf4c8f1433017989af0848793c19e406d77ff0ca168c5aa93eaa957a521daaf7fc7b752030d1712ab5c54490a008a0e914b5114b1ed0b449195d93
SSDEEP
3072:CUGp31sC9I7o00+6fzGZoYn0jV/+0CE8MlSd54TlW5o:CUGF+6NvjV+0CEXy4To5o
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameW
GetModuleHandleW
InitializeCriticalSection
GetProcAddress
SetErrorMode
GetCurrentThreadId
GetCurrentProcessId
HeapAlloc
GetProcessHeap
HeapFree
TerminateProcess
WaitForSingleObject
CreateProcessW
CloseHandle
DuplicateHandle
SearchPathW
GetCurrentProcess
CreateEventW
EnterCriticalSection
WriteProcessMemory
SetUnhandledExceptionFilter
VirtualAllocEx
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
HeapSize
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
LeaveCriticalSection
SetFilePointer
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
wsprintfW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
InitBugReport
SetBugReportUin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE