__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
RarExtLoader.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RarExtLoader.exe
Resource
win10v2004-20221111-en
Target
RarExtLoader.exe
Size
43KB
MD5
be2f585891b8fa4db2ab91aca1d643ec
SHA1
b76f831947630ef163d37593c56b3bc8e152a314
SHA256
18246c40e3da4cec61da412b2920b8246e858f60a96e301abfea31b4a85687d4
SHA512
ed29e0ebe095b9b10f80a35fa01aee80d6e3d2632b4965eb76f759755f78ad730162c53e59bdf2512daee2181478236e039fb0a5817273361128cead34dbacde
SSDEEP
768:Ofv2qCnC6N1TvxopebhcVIc+IbpTBGHDRn3VgOAGcGV/BL+3:Of+qCh1Tie9cCc+optGjN3VgpGcG/i3
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
ExitProcess
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTickCount
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LoadLibraryA
MapViewOfFile
OpenFileMappingA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnumThreadWindows
GetMessageA
KillTimer
MessageBoxA
PostQuitMessage
RegisterClassA
SetTimer
TranslateMessage
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ