?Set_CrashUploadParams@@YAXHPB_W@Z
GetExternElapseTime
GetStartTickCount
Static task
static1
Behavioral task
behavioral1
Sample
872dd954b63bd715e11d24c024faaf47334ed3767cbfa598feebe27d09832041.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
872dd954b63bd715e11d24c024faaf47334ed3767cbfa598feebe27d09832041.exe
Resource
win10v2004-20220812-en
Target
872dd954b63bd715e11d24c024faaf47334ed3767cbfa598feebe27d09832041
Size
276KB
MD5
0cb271a03e293a46af89e0270efa42fa
SHA1
441b74ce72596e20b31599473e6269158bab19e7
SHA256
872dd954b63bd715e11d24c024faaf47334ed3767cbfa598feebe27d09832041
SHA512
3d278bf489bea32a86a7a9592b9f4e12da66c3461390311d6e22fd7a402bd56581650d2c6b4cec1a78cd93a520e21ef3574585ce246a157798270df8098a9cbf
SSDEEP
6144:2FffXFxBPzAO/gb6Y6veN4LOPX4z4VT8rnZgN6D48QLW:QHXFxBPQbiveaLrz6TuGsD48r
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryExW
GetPrivateProfileIntW
GetTickCount
Sleep
GetCommandLineA
GetLastError
ReleaseMutex
CreateMutexW
OpenProcess
FindResourceExW
SizeofResource
LockResource
LoadResource
FindResourceW
WritePrivateProfileStringW
lstrlenW
OutputDebugStringW
WaitForSingleObject
LoadLibraryW
GetVersionExW
SetEnvironmentVariableW
LocalFree
LocalAlloc
LoadLibraryA
GetTempPathW
GetSystemInfo
ReadFile
CreateFileW
GetModuleHandleW
FreeLibrary
SetLastError
GetFullPathNameW
FindFirstFileW
FindNextFileW
FindClose
VirtualQuery
InterlockedCompareExchange
VirtualProtect
ResumeThread
FlushInstructionCache
SetThreadContext
GetThreadContext
VirtualFree
SuspendThread
VirtualAlloc
QueryPerformanceCounter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
InterlockedExchange
DecodePointer
EncodePointer
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetEnvironmentVariableW
GetPrivateProfileStringW
GetModuleFileNameW
GetCommandLineW
IsDebuggerPresent
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
CreateProcessW
CloseHandle
CreateEventW
WaitForMultipleObjects
GetCurrentThreadId
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentThread
RaiseException
lstrcmpiW
GetSystemTimeAsFileTime
wsprintfW
GetShellWindow
GetWindowThreadProcessId
GetDesktopWindow
FindWindowExW
OpenProcessToken
InitializeSecurityDescriptor
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
DuplicateTokenEx
SetSecurityDescriptorDacl
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
CommandLineToArgvW
SHGetFolderPathW
StringFromCLSID
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitialize
SysFreeString
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
StrCpyW
PathIsRelativeW
PathStripPathW
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Orphan_all@_Container_base0@std@@QAEXXZ
_except_handler4_common
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_crt_debugger_hook
_invoke_watson
_initterm_e
wmemcpy_s
??3@YAXPAX@Z
wcslen
_CxxThrowException
memcpy_s
memmove_s
__CxxFrameHandler3
??2@YAPAXI@Z
signal
_set_abort_behavior
_set_invalid_parameter_handler
_set_purecall_handler
_set_error_mode
?set_unexpected@@YAP6AXXZP6AXXZ@Z
?set_terminate@@YAP6AXXZP6AXXZ@Z
memcpy
memset
__pxcptinfoptrs
_wcsicmp
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
vswprintf_s
_vscwprintf
??1exception@std@@UAE@XZ
wcsnlen
??_V@YAXPAX@Z
strlen
memmove
wcsrchr
__wargv
__argc
wcscpy_s
wcsstr
wcscspn
?terminate@@YAXXZ
free
_wcsdup
wcscpy
wcschr
wcscat_s
malloc
wcstoul
memcmp
memchr
strcmp
_unlock
__dllonexit
_lock
_onexit
_controlfp_s
?Set_CrashUploadParams@@YAXHPB_W@Z
GetExternElapseTime
GetStartTickCount
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE