Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
b8c19e334ac58d03453991f8345a1f1d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8c19e334ac58d03453991f8345a1f1d.exe
Resource
win10v2004-20240226-en
Target
b8c19e334ac58d03453991f8345a1f1d
Size
1.7MB
MD5
b8c19e334ac58d03453991f8345a1f1d
SHA1
7579063273c639b5895f043b671eecb2517805fa
SHA256
34dad1453bb9c56fa112a0a0f1bc35a5c100c0614e6e17c553779fc17afe80ec
SHA512
832d6777d55edde15806a0b6cb853817a48894546c1d02740088330df5d5ed3c36d7ec840097c6a351f1286e54b3de861494a5ceb61a15a881f744bba8b01d01
SSDEEP
12288:p8VyRoZUCnf5888U3sp78MRLwM6uaIoT0B4fwWvVFsS00aFsS00630zQ:p8VyRrCf8p7JwxIoX/vVFSFS3SQ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\WnBrowser\Chromium\src\out\Release\initialexe\chrome.exe.pdb
SignalChromeElf
UuidCreate
GetSecurityDescriptorSacl
GetUserNameW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
CreateProcessAsUserW
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
SystemFunction036
GetAce
GetKernelObjectSecurity
GetLengthSid
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
LookupPrivilegeValueW
SetThreadToken
SetEntriesInAclW
GetSecurityInfo
ImpersonateNamedPipeClient
WinHttpAddRequestHeaders
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpSetTimeouts
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
timeGetTime
PathAppendW
PathRemoveFileSpecW
StrStrIW
CloseDesktop
CloseWindowStation
CreateDesktopW
GetThreadDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
FindWindowExW
CharUpperW
GetWindowThreadProcessId
AllowSetForegroundWindow
IsWindow
SendMessageTimeoutW
GetConsoleCP
GetProcessHeap
HeapFree
GetConsoleMode
ExitProcess
SetStdHandle
GetFullPathNameW
HeapReAlloc
HeapAlloc
GetDriveTypeW
EncodePointer
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryExA
GetACP
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
GetStartupInfoW
LCMapStringW
IsValidLocale
EnumSystemLocalesW
HeapSize
FreeEnvironmentStringsW
WriteConsoleW
IsValidCodePage
GetOEMCP
ReadConsoleW
FileTimeToLocalFileTime
PeekNamedPipe
OutputDebugStringW
SetEnvironmentVariableA
GetEnvironmentStringsW
ExpandEnvironmentStringsW
GetComputerNameExW
GetSystemDefaultLCID
GetThreadLocale
GetTimeZoneInformation
IsProcessorFeaturePresent
CreateSemaphoreW
ReleaseSemaphore
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetVersion
CloseHandle
SetErrorMode
HeapSetInformation
WaitForSingleObject
CreateThread
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetLastError
SetLastError
CreateEventW
GetCurrentThreadId
DuplicateHandle
GetCurrentProcess
GetProcessId
SetCurrentDirectoryW
SetProcessShutdownParameters
LoadLibraryExW
OpenProcess
GetCurrentProcessId
CreateRemoteThread
GetFileInformationByHandle
GetExitCodeProcess
CompareStringW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
LockResource
SizeofResource
FindResourceW
GetSystemInfo
VirtualAlloc
VirtualFree
GetTickCount
FormatMessageA
WriteFile
CreateFileW
DeleteFileW
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
GetCurrentThread
GetSystemTimeAsFileTime
Sleep
FileTimeToSystemTime
SetThreadPriority
GetThreadPriority
QueryPerformanceFrequency
GetCommandLineW
LocalFree
GetNativeSystemInfo
GetVersionExW
TerminateProcess
IsDebuggerPresent
GetEnvironmentVariableW
SetEnvironmentVariableW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GetUserDefaultLangID
SetInformationJobObject
CreateProcessW
SetHandleInformation
AssignProcessToJobObject
ReadFile
GetStdHandle
CreatePipe
ResumeThread
GetProcessTimes
CreateDirectoryW
GetFileAttributesW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
QueryDosDeviceW
lstrlenW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetFileSizeEx
GetLocaleInfoW
GetUserDefaultUILanguage
LeaveCriticalSection
EnterCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleExW
RegisterWaitForSingleObject
UnregisterWaitEx
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
FindFirstFileExW
FindClose
FreeLibrary
SetUnhandledExceptionFilter
SetEvent
ResetEvent
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
VirtualQueryEx
VirtualAllocEx
VirtualProtectEx
WriteProcessMemory
InitializeCriticalSection
TerminateJobObject
GetUserDefaultLCID
GetThreadContext
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
ReadProcessMemory
SuspendThread
DebugBreak
SearchPathW
LockFileEx
UnlockFileEx
SleepEx
ConnectNamedPipe
DisconnectNamedPipe
WTSFreeMemory
WTSQuerySessionInformationW
ClearCrashKeyValueImpl
CrashForException
DumpProcessWithoutCrash
GetHandleVerifier
GetUploadedReportsImpl
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
IsSandboxedProcess
SetCrashKeyValueImpl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ