Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
e19d13424ed5277f6b78f6a2f99a6224cbd7676153ed1ef8803350b9dc4698c6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e19d13424ed5277f6b78f6a2f99a6224cbd7676153ed1ef8803350b9dc4698c6.exe
Resource
win10v2004-20240802-en
Target
e19d13424ed5277f6b78f6a2f99a6224cbd7676153ed1ef8803350b9dc4698c6
Size
775KB
MD5
9cb4b835b3938cbea8aacbc45fbf7d5e
SHA1
0cfbd8a85f967d20ab83f6dfcafd2b0e4ca7dfa6
SHA256
e19d13424ed5277f6b78f6a2f99a6224cbd7676153ed1ef8803350b9dc4698c6
SHA512
0bae9b0fe40993449b227f12d7b4d9f8572d22a4464e9de93776f70b2c9b67b7bc25f39f8e83b42f06e5ce6b1ee8f8086f1241d63c98e8a3bf0e74233f1810d3
SSDEEP
12288:CuKeE7eBJjThw+MutDJWSXqfkoJVtVhO4jTkTwZbUXpBtgifyHOa2D52mFEATsw/:Cu1YQThwK9WjlPG0O7522TsFMceJn
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\libcef\bugly-windows\out\x86\crashpad_handler.pdb
GetModuleFileNameW
GetFileInformationByHandleEx
GetCurrentProcess
RegisterWaitForSingleObject
GetQueuedCompletionStatus
WaitForSingleObject
DuplicateHandle
DisconnectNamedPipe
OpenProcess
PostQueuedCompletionStatus
CreateEventW
SetEvent
CreateThread
UnregisterWaitEx
CreateIoCompletionPort
ConnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
CreateFileW
GetVersion
TransactNamedPipe
WaitNamedPipeW
LoadLibraryW
GetProcAddress
FindClose
CloseHandle
TerminateProcess
ReleaseSemaphore
CreateSemaphoreW
ReadFile
GetFileSizeEx
GetStdHandle
WriteFile
SetEndOfFile
UnlockFileEx
SetFilePointerEx
LockFileEx
GetFileType
GetModuleHandleW
FormatMessageA
LocalFree
CreateDirectoryW
GetFileAttributesW
DeleteFileW
GetTimeZoneInformation
GetSystemInfo
IsProcessorFeaturePresent
VerSetConditionMask
VerifyVersionInfoW
GetProcessId
SuspendThread
ResumeThread
GetThreadContext
GetProcessTimes
GetSystemDefaultLCID
GetThreadLocale
GetUserDefaultLCID
GetPrivateProfileStringW
CreateProcessW
IsWow64Process
WriteProcessMemory
Sleep
VirtualAllocEx
ReadProcessMemory
SleepEx
IsDebuggerPresent
SizeofResource
MultiByteToWideChar
LockResource
FindResourceExW
IsDBCSLeadByte
LoadResource
FindResourceW
lstrcpyW
GetPrivateProfileSectionW
VirtualFree
VirtualAlloc
VirtualProtect
DeviceIoControl
SetLastError
WideCharToMultiByte
SwitchToThread
GetFullPathNameW
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
GetCurrentProcessId
GetLocalTime
OutputDebugStringW
FormatMessageW
GetCurrentThreadId
SetUnhandledExceptionFilter
GetProcessHeap
DeleteCriticalSection
GetCurrentDirectoryW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
HeapDestroy
InitializeCriticalSection
VirtualQueryEx
GetFileTime
RemoveDirectoryW
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleExW
ExitProcess
GetCommandLineW
GetCommandLineA
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetStartupInfoW
InitializeSListHead
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
GetCPInfo
GetStringTypeW
GetSystemTimeAsFileTime
InitOnceExecuteOnce
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
SetProcessShutdownParameters
HeapFree
CreateFileA
SetConsoleCtrlHandler
QueryPerformanceCounter
EncodePointer
LCMapStringEx
ImpersonateNamedPipeClient
RevertToSelf
BuildSecurityDescriptorW
ConvertStringSecurityDescriptorToSecurityDescriptorW
BuildExplicitAccessWithNameW
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
SystemFunction036
RegOpenKeyExA
CreateWindowExW
DestroyWindow
SetWindowLongW
DispatchMessageW
GetMessageW
GetWindowLongW
EnableWindow
TranslateMessage
RegisterClassW
DefWindowProcW
EndPaint
BeginPaint
InvalidateRect
LoadImageW
DialogBoxParamW
UnregisterClassW
PostMessageW
GetSysColorBrush
KillTimer
DrawIconEx
DrawTextW
GetDlgItem
GetClientRect
MapDialogRect
SendDlgItemMessageW
MapWindowPoints
SetDlgItemTextW
ClientToScreen
SetTimer
ShowWindow
SetWindowTextW
GetWindowTextLengthW
EndDialog
GetWindowTextW
GetWindowThreadProcessId
GetMenuItemCount
CreatePopupMenu
IsWindow
DestroyMenu
GetKeyState
CallWindowProcW
GetWindowRect
SetWindowPos
SendMessageW
TrackPopupMenu
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpReadData
WinHttpWriteData
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpConnect
WinHttpQueryHeaders
WinHttpCrackUrl
CallNtPowerInformation
StringFromCLSID
OleInitialize
CoCreateGuid
CoTaskMemFree
PathFileExistsW
PathRemoveFileSpecW
GdiplusStartup
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
DeleteObject
SetBkMode
SetTextColor
GetStockObject
CreateFontW
SelectObject
SHGetFileInfoW
ShellExecuteW
ord155
SHBindToParent
SHGetDesktopFolder
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ