ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetClientId
SetCrashKeyValueImpl
SetExperimentList3
Static task
static1
Behavioral task
behavioral1
Sample
ed66bc7436bece10543a91350e9ace10c4af2e18217e5a672501a712ebbcb58c.exe
Resource
win7-20220901-en
Target
ed66bc7436bece10543a91350e9ace10c4af2e18217e5a672501a712ebbcb58c
Size
910KB
MD5
13b71326226040402864c7f778c249a3
SHA1
563ddae887b0c1355f66e45d9d6bcf42c5872e0f
SHA256
ed66bc7436bece10543a91350e9ace10c4af2e18217e5a672501a712ebbcb58c
SHA512
c7425764f4b1f5358c655dbfa24f0851204b44dd2e5e033f125cf39e1912020f26360de6840028668a907f23afe0e882c35a35fb50ef6ce1c07ddce7882ff895
SSDEEP
24576:tpR9Jw/cCOwvCygXoiECEpoIhuoKPZCCPo8:eUCOwvCywdECELhuoKPRj
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PathRemoveFileSpecW
LoadLibraryA
GetTempPathW
GetLastError
GetTickCount
GetCurrentProcessId
GetModuleHandleW
VirtualProtect
VirtualAllocEx
VirtualFreeEx
InterlockedCompareExchange
Sleep
OutputDebugStringA
DuplicateHandle
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
VirtualFree
SetFilePointer
ReadFile
GetSystemInfo
FreeLibrary
VirtualAlloc
CreateFileW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetUserDefaultLangID
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
CreateMutexW
FormatMessageA
WriteFile
SetLastError
ReleaseMutex
lstrlenW
IsDebuggerPresent
CreateEventW
ExpandEnvironmentStringsW
LocalAlloc
GetCurrentThreadId
MapViewOfFile
CreateDirectoryW
GetFileAttributesW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
QueryDosDeviceW
GetProcessTimes
OpenProcess
GetProcessId
GetNativeSystemInfo
GetVersionExW
SetInformationJobObject
SetHandleInformation
AssignProcessToJobObject
GetStdHandle
SetUnhandledExceptionFilter
GetLocaleInfoW
GetUserDefaultUILanguage
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
RaiseException
CreateThread
HeapSetInformation
InterlockedExchange
SetEndOfFile
FlushFileBuffers
GetModuleHandleExW
RegisterWaitForSingleObject
UnregisterWaitEx
TlsGetValue
InterlockedIncrement
TlsSetValue
TlsAlloc
TlsFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
SetEvent
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
VirtualQueryEx
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
GetThreadContext
SuspendThread
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
GetFileType
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
GetComputerNameExW
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
GetFullPathNameW
HeapAlloc
GetProcessHeap
HeapReAlloc
SetStdHandle
RtlUnwind
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetDriveTypeW
CompareStringW
GetCurrentProcess
TerminateProcess
CreateProcessW
CloseHandle
CreateRemoteThread
InterlockedExchangeAdd
GetModuleHandleA
FormatMessageW
LocalFree
SetCurrentDirectoryW
LoadLibraryExW
GetModuleFileNameW
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
ResumeThread
CreateProcessAsUserW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegEnumKeyExW
RegDeleteValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegDisablePredefinedCache
RevertToSelf
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetThreadToken
RegSetValueExA
CreateRestrictedToken
DuplicateTokenEx
GetUserNameW
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
MessageBoxW
wsprintfW
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
IsWindow
SendMessageTimeoutW
AllowSetForegroundWindow
GetWindowThreadProcessId
CharUpperW
CloseWindowStation
FindWindowExW
GetProfileType
WTSFreeMemory
WTSQuerySessionInformationW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
timeGetTime
ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetClientId
SetCrashKeyValueImpl
SetExperimentList3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE