Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
399f86bcd8bf8775b23a1737bd886c80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
399f86bcd8bf8775b23a1737bd886c80N.exe
Resource
win10v2004-20240709-en
Target
399f86bcd8bf8775b23a1737bd886c80N.exe
Size
422KB
MD5
399f86bcd8bf8775b23a1737bd886c80
SHA1
7f9b7798c976316dffae57a2ab3f8bfc9ea328af
SHA256
d883517724fb0037657d5c81a5f7c992dc4fbf90d54d42226c08516fa79c05dd
SHA512
7b0a2364abc40993f6bc0c6aaa9f87f3c40e47b6faf8419f5c62a304b7d25439e8f61f9c1d5012d5d00743168fa08534af5040ccf3dda21729ff72af8f1ab9f1
SSDEEP
3072:wYrf3or6N2vbwYDisueK7cPz4MJQP8gW3DTD5uSwzZwcQKlU2k7HoZ7WK7Tx6NTL:wCA6SbdDHfPzZO0gUDsVxU27WGohDnAe
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\dev\projs\ProcessSupervisor\output\QuickUpgrade.pdb
GetActiveProcessorGroupCount
GetLogicalProcessorInformationEx
GetActiveProcessorCount
DeleteCriticalSection
DecodePointer
InitializeCriticalSectionEx
CopyFileW
FreeLibrary
CreateThread
SetCurrentDirectoryW
CreateProcessW
GetStartupInfoW
Sleep
OpenEventW
SetEvent
CreateEventW
GetLastError
MultiByteToWideChar
GetFileAttributesW
GetSystemInfo
GetModuleHandleW
LoadLibraryW
GetExitCodeProcess
ExitProcess
GetSystemTimeAsFileTime
RemoveDirectoryW
DeleteFileW
WaitForSingleObject
CloseHandle
WriteFile
CreateFileW
CreateDirectoryW
GetTempPathW
VerSetConditionMask
VerifyVersionInfoW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
WriteConsoleW
LocalFree
WideCharToMultiByte
GetProcAddress
GetCurrentProcess
LoadLibraryExW
GetUserDefaultUILanguage
SetLastError
GetCurrentProcessId
OpenProcess
GetModuleFileNameW
WinExec
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
TerminateThread
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessTimes
TerminateProcess
IsDebuggerPresent
OutputDebugStringW
RaiseException
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
QueryPerformanceCounter
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetStdHandle
GetFileType
LCMapStringW
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetWindowThreadProcessId
GetWindow
MessageBoxW
DialogBoxParamW
GetDlgItem
SendMessageW
SetDlgItemTextW
EndDialog
EnumWindows
EnableWindow
ShowWindow
CreateWindowExW
LoadStringW
PostMessageW
IsWindowVisible
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
InitializeSecurityDescriptor
OpenProcessToken
GetTokenInformation
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegSetValueExW
GetSidSubAuthority
GetSidSubAuthorityCount
ChangeServiceConfigW
SetSecurityDescriptorDacl
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteExW
CoInitialize
SysFreeString
VariantClear
SysAllocString
InternetOpenUrlW
InternetCloseHandle
InternetReadFile
InternetOpenW
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ