Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ba3588f6ae6174ce36ff565d50b76aff35992d9b88b7eb002547caddecb2f87b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba3588f6ae6174ce36ff565d50b76aff35992d9b88b7eb002547caddecb2f87b.exe
Resource
win10v2004-20240226-en
Target
ba3588f6ae6174ce36ff565d50b76aff35992d9b88b7eb002547caddecb2f87b
Size
824KB
MD5
debab66b1c7794a0dab5f6a4a275be63
SHA1
267d48e34d840c1de66ddf93718479b1b96e6179
SHA256
ba3588f6ae6174ce36ff565d50b76aff35992d9b88b7eb002547caddecb2f87b
SHA512
892f3f5ffcab1a99bc4b127d9ee0829068ee89cafe19ec4f93993475eefd0d273478078e17d1f01f33ac829903903dbec9f04dd6a00bee8372ea242b126c2418
SSDEEP
12288:dfVRjWa45qJRt/jtinjMa78Z6RXwRsD35rYuoxPR4ojbIj0XG6:dN4acORt7I78qwRm35rYu8W6
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Program Files\Git\builds\9855a870\0\drpo\safespace\frontend\DoubleClick\out\win_release_x64\dblclck.pdb
DestroyEnvironmentBlock
CreateEnvironmentBlock
timeGetTime
SymSetSearchPathW
SymCleanup
SymGetLineFromAddr64
SymInitialize
SymGetSearchPathW
SymFromAddr
SymSetOptions
ExitThread
HeapFree
HeapAlloc
GetConsoleMode
GetConsoleCP
GetFileType
SetStdHandle
GetFullPathNameW
ExitProcess
RtlUnwindEx
RtlPcToFileHeader
UnregisterWaitEx
VirtualFree
VirtualAlloc
GetLastError
RaiseException
GetProcAddress
GetModuleHandleW
SwitchToThread
ReleaseSRWLockExclusive
GetModuleFileNameW
GetSystemDirectoryW
GetWindowsDirectoryW
GetCommandLineW
LocalFree
FreeLibrary
LoadLibraryExW
IsDebuggerPresent
GetModuleHandleExW
GetCurrentProcess
RtlCaptureStackBackTrace
GetCurrentThread
SetUnhandledExceptionFilter
SetLastError
FindFirstFileExW
FindNextFileW
FindClose
GetFileAttributesW
CreateDirectoryW
ReadFile
WriteFile
GetTempPathW
CreateFileW
GetFileAttributesExW
CloseHandle
GetCurrentDirectoryW
SetEndOfFile
DuplicateHandle
SetFilePointerEx
FlushFileBuffers
ExpandEnvironmentStringsW
OutputDebugStringA
GetLocalTime
FormatMessageA
GetTickCount
HeapReAlloc
LoadLibraryW
WaitForSingleObject
OpenProcess
GetExitCodeProcess
SetHandleInformation
GetStdHandle
AssignProcessToJobObject
FreeEnvironmentStringsW
CreateProcessW
GetEnvironmentStringsW
GetProcessId
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetCurrentProcessId
QueryFullProcessImageNameW
TerminateProcess
MultiByteToWideChar
WideCharToMultiByte
AcquireSRWLockExclusive
SetThreadPriority
GetCurrentThreadId
Sleep
GetThreadPriority
CreateThread
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
FileTimeToSystemTime
HeapSize
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
GetProductInfo
GetVersionExW
GetNativeSystemInfo
IsWow64Process
DeviceIoControl
FindFirstStreamW
FindNextStreamW
GetVolumeInformationByHandleW
VirtualProtect
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadConsoleW
GetDriveTypeW
WriteConsoleW
GetProcessHeap
IsValidCodePage
GetOEMCP
GetCommandLineA
QueryPerformanceFrequency
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
ResetEvent
SetEvent
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
WaitForSingleObjectEx
GetExitCodeThread
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
AllowSetForegroundWindow
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
CreateProcessAsUserW
SHGetKnownFolderPath
SHGetFolderPathW
SHChangeNotify
CommandLineToArgvW
CoTaskMemFree
GetHandleVerifier
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ