Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ca3a33d4db93a59cc49f32871ca1a4690edb78451e7b26c9c97f2c494ebc1105.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ca3a33d4db93a59cc49f32871ca1a4690edb78451e7b26c9c97f2c494ebc1105.exe
Resource
win10v2004-20240611-en
Target
ca3a33d4db93a59cc49f32871ca1a4690edb78451e7b26c9c97f2c494ebc1105
Size
859KB
MD5
6a33e4640b9d2f52c279c630f6941001
SHA1
c0186b86dc95c6bfa6232e8a43013556ff2cb8cb
SHA256
ca3a33d4db93a59cc49f32871ca1a4690edb78451e7b26c9c97f2c494ebc1105
SHA512
3ad046b05c67ffb698ce3aca6dce2417105c5efb133d4c6bf235dee62850156e0a75344be9e705952c468d15ab24869240d012672f9a0e4823df253d20c7e337
SSDEEP
12288:b5GD0rELaNZwI4+Xc4KsA4STCk4PTas+O+/bgQCFmDiJYLWkHdRfkDxvK7qbASIk:9GD0oLazw4QCAiisl12msy
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
G:\devops-filmora-agent\workspace\p-e5efa306f5d34fa4ab8592037c316151\src\20240528200542\Bin\x64\Release\Wondershare Filmora Launcher.pdb
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
PathFileExistsW
ReadConsoleW
FindFirstFileW
FreeResource
FindResourceW
LoadResource
SizeofResource
GetModuleFileNameW
lstrlenW
LockResource
CreateDirectoryW
GetTempPathW
GetLastError
CreateSemaphoreW
GetCurrentThreadId
CloseHandle
MoveFileExW
SetStdHandle
GetPrivateProfileStringW
QueryFullProcessImageNameW
K32GetModuleFileNameExW
OpenProcess
LoadLibraryW
Sleep
GetExitCodeProcess
WritePrivateProfileSectionW
WritePrivateProfileStringW
GetPrivateProfileIntW
OpenMutexW
GetProcAddress
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetCurrentProcessId
WriteConsoleW
CreateFileW
SetEndOfFile
WaitForSingleObject
GetCPInfo
OutputDebugStringW
LoadLibraryExW
WideCharToMultiByte
MultiByteToWideChar
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStringTypeW
HeapFree
HeapAlloc
FindFirstFileExW
FindNextFileW
RemoveDirectoryW
DeleteFileW
FindClose
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetEnvironmentVariableA
GetSystemTimeAsFileTime
GetCommandLineW
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
IsProcessorFeaturePresent
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsDebuggerPresent
GetStdHandle
GetFileType
GetProcessHeap
ExitProcess
GetModuleHandleExW
WriteFile
ReadFile
SetFilePointerEx
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
GetTimeZoneInformation
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
HeapReAlloc
RegCloseKey
RegCreateKeyExW
RegSetValueExW
ord680
ShellExecuteW
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ