Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
chrome.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
chrome.exe
Resource
win10v2004-20220812-en
Target
chrome.exe
Size
748KB
MD5
9e1b7a2c939eb536a9ec2f4d97a9a972
SHA1
703ef8d6821fd94e4a0a32beba7e67f971f3b566
SHA256
68ea4426aa7d187149bce1fa626b979acdc2d9887c8284121068a604f5b45a1e
SHA512
1f6ceca5b1f2f094e67810582a86413dde5270e1da58d5d1d460fd63573ef4f54de6a3a541f0333ab382e3be00882a5970756d9c19890212f72999585b584271
SSDEEP
12288:/6UE9nk8JsEHkMI9ZFtU4E/NRQRkkkkkkkkkkkkkkUkkkkkkkkkkkkkkkkkkkkkR:/63njsEEMIHFmdPekkkkkkkkkkkkkkUQ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OutputDebugStringW
FormatMessageW
SetCurrentDirectoryW
WaitForSingleObject
GetExitCodeProcess
GetThreadLocale
GetLocaleInfoW
GetVersionExW
CreateFileW
GetCurrentProcessId
LeaveCriticalSection
FreeLibrary
CreateThread
GetCurrentProcess
ReleaseSemaphore
EnterCriticalSection
InitializeCriticalSection
CreateSemaphoreW
LoadLibraryW
DeleteCriticalSection
GetCurrentThreadId
SetEvent
ResetEvent
SetNamedPipeHandleState
WaitNamedPipeW
WaitForMultipleObjects
WriteFile
TransactNamedPipe
GetModuleHandleW
TerminateProcess
GetTickCount
SetInformationJobObject
SetLastError
CreateEventW
PostQueuedCompletionStatus
GetQueuedCompletionStatus
CreateIoCompletionPort
DuplicateHandle
TerminateJobObject
LocalFree
ResumeThread
InterlockedExchange
InterlockedCompareExchange
SignalObjectAndWait
InterlockedDecrement
InterlockedIncrement
AssignProcessToJobObject
MapViewOfFile
GetThreadContext
WriteProcessMemory
CreateFileMappingW
RegisterWaitForSingleObject
UnregisterWaitEx
CreateJobObjectW
VirtualAllocEx
VirtualFreeEx
VirtualProtectEx
CreateNamedPipeW
OpenEventW
CreateMutexW
ReadProcessMemory
VirtualQuery
SuspendThread
GetLongPathNameW
GetFileAttributesW
GetCurrentDirectoryW
lstrlenW
DebugBreak
GetUserDefaultLangID
LoadLibraryExW
HeapSetInformation
GetSystemTimeAsFileTime
ReleaseMutex
SetFilePointer
RaiseException
Sleep
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryW
GetSystemDirectoryW
QueryPerformanceCounter
UnmapViewOfFile
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetACP
GetLocaleInfoA
GetTimeZoneInformation
CreateFileA
ExitThread
UnhandledExceptionFilter
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetModuleHandleA
ExitProcess
HeapReAlloc
RtlUnwind
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapSize
LoadLibraryA
VirtualAlloc
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProcAddress
GetLastError
GetFileAttributesExW
GetModuleFileNameW
SearchPathW
SetEnvironmentVariableW
GetTempPathW
SetUnhandledExceptionFilter
CreateProcessW
GetEnvironmentVariableW
CloseHandle
GetCommandLineW
UnregisterClassA
CloseDesktop
CreateDesktopW
MessageBoxW
RevertToSelf
CreateProcessAsUserW
GetLengthSid
SetTokenInformation
ConvertStringSidToSidW
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetThreadToken
SetSecurityInfo
GetSecurityDescriptorSacl
CopySid
CreateWellKnownSid
RegDisablePredefinedCache
EqualSid
DuplicateToken
LookupPrivilegeValueW
DuplicateTokenEx
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
ConvertSidToStringSidW
SetEntriesInAclW
CreateRestrictedToken
GetTokenInformation
timeGetTime
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
SHGetFolderPathW
CommandLineToArgvW
DumpProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ