Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
b67a53fb73514d9ff24b185ce25d4f26.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b67a53fb73514d9ff24b185ce25d4f26.exe
Resource
win10v2004-20240226-en
Target
b67a53fb73514d9ff24b185ce25d4f26
Size
1.0MB
MD5
b67a53fb73514d9ff24b185ce25d4f26
SHA1
bccad59b6e4dc8a8e97f9efe35c22794bd47a4ff
SHA256
23c28ba9209fbf0ef195a29be1ff95e24eda60aac980e2cb042d036f59c844c9
SHA512
fd81a0bec94c85b3ed75f0a32fee4187bdd7cc41eb93a6d5505151ed30a8131d1a0bd4dd8d8ef600f252d076789ce900c2ef36cdfedb2f5dbdfae8951489de9e
SSDEEP
24576:R7Z68Qen1zAL7YNAfOTE031YXdZOFGmWojV:Rt68Qen1zu4TEQ1YXdQPWu
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\b\build\slave\chrome-official\build\src\build\Release\nacl64_exe.pdb
VirtualProtect
GetTickCount
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
SetInformationJobObject
WaitForSingleObject
SetLastError
GetLastError
InitializeCriticalSection
TerminateJobObject
GetQueuedCompletionStatus
SetEvent
ResetEvent
DuplicateHandle
GetCurrentThreadId
CreateThread
CreateEventW
CreateIoCompletionPort
DeleteCriticalSection
PostQueuedCompletionStatus
SignalObjectAndWait
SetHandleInformation
GetProcessHandleCount
VirtualFree
LocalFree
FreeLibrary
LoadLibraryW
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
VirtualQueryEx
GetExitCodeProcess
GetThreadContext
AssignProcessToJobObject
UnregisterWaitEx
RegisterWaitForSingleObject
VirtualFreeEx
VirtualProtectEx
GetFileAttributesW
CreateFileW
QueryDosDeviceW
CreateJobObjectW
CreateMutexW
GetCurrentProcessId
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
lstrlenW
VirtualQuery
ReadProcessMemory
GetCurrentDirectoryW
ReleaseMutex
SetFilePointer
WriteFile
OutputDebugStringA
FormatMessageA
MultiByteToWideChar
WideCharToMultiByte
ExpandEnvironmentStringsW
SetEnvironmentVariableW
GetUserDefaultLangID
RaiseException
IsDebuggerPresent
SetThreadPriority
GetStdHandle
OpenProcess
HeapSetInformation
GetSystemInfo
ReadFile
GetSystemTimeAsFileTime
GetNativeSystemInfo
GetVersionExW
QueryPerformanceCounter
QueryPerformanceFrequency
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
UnmapViewOfFile
SwitchToThread
SetCurrentDirectoryW
FindClose
FindNextFileW
FindFirstFileW
VirtualAlloc
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
GetSystemPowerStatus
RtlCaptureStackBackTrace
GetCurrentThread
SetEndOfFile
FlushFileBuffers
GetFileInformationByHandle
GetWindowsDirectoryW
GetSystemDirectoryW
WaitForMultipleObjects
ReleaseSemaphore
RtlCaptureContext
CreateSemaphoreW
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetUserDefaultLCID
SizeofResource
LockResource
LoadResource
FindResourceW
RtlUnwindEx
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
HeapFree
GetStartupInfoW
LoadLibraryA
HeapAlloc
GetConsoleCP
GetConsoleMode
SetStdHandle
GetFileType
HeapReAlloc
GetProcessHeap
RtlPcToFileHeader
LCMapStringA
LCMapStringW
GetCPInfo
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
GetModuleFileNameA
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateFileA
GetCurrentDirectoryA
GetDriveTypeA
GetFullPathNameA
CompareStringA
CompareStringW
SetEnvironmentVariableA
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
SuspendThread
ConnectNamedPipe
CancelIo
GetNamedPipeInfo
GetEnvironmentVariableA
GetUserDefaultUILanguage
LocalAlloc
MapViewOfFileEx
GetSystemTime
lstrlenA
PeekNamedPipe
DisconnectNamedPipe
GetNamedPipeHandleStateW
OpenThread
SetThreadContext
FlushInstructionCache
ExitThread
FindFirstFileA
VirtualAllocEx
ResumeThread
GetModuleHandleW
GetCurrentProcess
GetLongPathNameW
GetModuleFileNameW
QueueUserWorkItem
GetTempPathW
GetEnvironmentVariableW
GetCommandLineW
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
ExitProcess
Sleep
GetModuleHandleA
GetProcAddress
PostQuitMessage
CallMsgFilterW
TranslateMessage
DispatchMessageW
MsgWaitForMultipleObjectsEx
GetQueueStatus
PeekMessageW
WaitMessage
SetTimer
KillTimer
PostMessageW
WaitForInputIdle
wsprintfW
CharUpperW
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
MessageBoxW
CloseWindowStation
UnregisterClassW
DestroyWindow
DefWindowProcW
CreateWindowExW
RegisterClassExW
SetSecurityInfo
RegDisablePredefinedCache
RegOpenKeyExW
RegCloseKey
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetThreadToken
CreateProcessAsUserW
RegCreateKeyExW
CreateRestrictedToken
DuplicateTokenEx
DuplicateToken
EqualSid
LookupPrivilegeValueW
CopySid
CreateWellKnownSid
GetSecurityInfo
GetTokenInformation
OpenProcessToken
SetEntriesInAclW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegSetValueExW
ConvertSidToStringSidW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
TraceEvent
RevertToSelf
DestroyEnvironmentBlock
CreateEnvironmentBlock
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeEndPeriod
timeGetTime
timeGetDevCaps
timeBeginPeriod
accept
listen
bind
setsockopt
htonl
WSAStartup
htons
ntohs
WSACleanup
gethostbyname
shutdown
select
send
recv
closesocket
socket
CrashForException
DumpProcess
DumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ