ClearCrashKeyValueImpl
CrashForException
DumpProcessWithoutCrash
GetHandleVerifier
GetUploadedReportsImpl
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
SetCrashKeyValueImpl
Static task
static1
Behavioral task
behavioral1
Sample
4f01ffe98009a8090ea8a086d21c62c24219b21938ea3ec7da8072f8c4dcc7a6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4f01ffe98009a8090ea8a086d21c62c24219b21938ea3ec7da8072f8c4dcc7a6.exe
Resource
win10v2004-20230915-en
Target
4f01ffe98009a8090ea8a086d21c62c24219b21938ea3ec7da8072f8c4dcc7a6.zip
Size
447KB
MD5
b5d01c3f545d9b6374ce178616ae94a7
SHA1
3adc6088b2d1844e5e0610751ba9258af78b8fe5
SHA256
fdc92c9b390e84c47551d7ab6cbe3222a95c4d3b78ba144ec1b41d0d03a8a7e4
SHA512
6d9ca2254ffb1bb2f54da39e9c51358412daa2da7affe2f9d0e16b886de649645785247dc7bed307cf6f8ee2465e217ab8134841c459fac501195d513d4eac64
SSDEEP
12288:dQUzJ1yLupdCmVJ2piwCCkEFWJs76zLj/Mxv:dQUl0MYhiRCkElv
Checks for missing Authenticode signature.
resource |
---|
unpack001/4f01ffe98009a8090ea8a086d21c62c24219b21938ea3ec7da8072f8c4dcc7a6 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
SignalChromeElf
UuidCreate
SetThreadToken
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
CreateProcessAsUserW
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
SystemFunction036
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
ImpersonateNamedPipeClient
SetEntriesInAclW
GetSecurityInfo
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
timeGetTime
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
PeekMessageW
PostThreadMessageW
CharUpperW
ConnectNamedPipe
DisconnectNamedPipe
GetSystemInfo
LoadLibraryExA
GetSystemDefaultLCID
PeekNamedPipe
FileTimeToLocalFileTime
SetEnvironmentVariableA
OutputDebugStringW
LCMapStringW
EnumSystemLocalesW
IsValidLocale
GetDriveTypeW
ReadConsoleW
RtlUnwind
GetStringTypeW
GetCPInfo
GetOEMCP
IsValidCodePage
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStartupInfoW
UnhandledExceptionFilter
HeapSize
GetACP
MultiByteToWideChar
ExitProcess
GetFullPathNameW
SetStdHandle
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
IsProcessorFeaturePresent
EncodePointer
HeapSetInformation
GetCurrentThreadId
GetModuleHandleA
GetProcAddress
GetLastError
SetLastError
CreateEventW
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
GetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
OpenProcess
GetCurrentProcessId
CreateRemoteThread
GetModuleHandleW
GetFileInformationByHandle
GetExitCodeProcess
CompareStringW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetModuleFileNameW
LoadResource
LockResource
SizeofResource
FindResourceW
VirtualAlloc
VirtualFree
CreateFileW
DeleteFileW
WriteFile
OutputDebugStringA
CloseHandle
GetTickCount
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetCurrentThread
SetThreadPriority
GetThreadPriority
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineW
LocalFree
GetVersionExW
GetNativeSystemInfo
TerminateProcess
GetEnvironmentVariableW
SetEnvironmentVariableW
GetUserDefaultLangID
ExpandEnvironmentStringsW
GetStdHandle
ReadFile
SetHandleInformation
CreatePipe
ResumeThread
CreateProcessW
AssignProcessToJobObject
SetInformationJobObject
GetProcessTimes
IsDebuggerPresent
CreateThread
CreateDirectoryW
GetFileAttributesW
GetLongPathNameW
QueryDosDeviceW
GetTempPathW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LoadLibraryW
FlushFileBuffers
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
GetLocaleInfoW
GetUserDefaultUILanguage
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
UnregisterWaitEx
RegisterWaitForSingleObject
GetModuleHandleExW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FindClose
FindFirstFileExW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetEvent
ResetEvent
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
VirtualAllocEx
VirtualQueryEx
VirtualProtectEx
WriteProcessMemory
InitializeCriticalSection
TerminateJobObject
GetUserDefaultLCID
GetThreadContext
FreeLibrary
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
ReadProcessMemory
SuspendThread
DebugBreak
lstrlenW
SearchPathW
LockFileEx
UnlockFileEx
SleepEx
GetVersion
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
GetTimeZoneInformation
GetThreadLocale
ReleaseSemaphore
CreateSemaphoreW
WinHttpSendRequest
WinHttpOpenRequest
WinHttpReceiveResponse
WinHttpReadData
WinHttpConnect
WinHttpOpen
WinHttpCrackUrl
WinHttpQueryHeaders
WinHttpSetTimeouts
WinHttpAddRequestHeaders
WinHttpCloseHandle
ClearCrashKeyValueImpl
CrashForException
DumpProcessWithoutCrash
GetHandleVerifier
GetUploadedReportsImpl
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
SetCrashKeyValueImpl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ