Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5ddab1779b36604feaf80a524ea4b527e8fd5516fd4c519743193c71a6a68754.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ddab1779b36604feaf80a524ea4b527e8fd5516fd4c519743193c71a6a68754.exe
Resource
win10v2004-20240802-en
Target
5ddab1779b36604feaf80a524ea4b527e8fd5516fd4c519743193c71a6a68754
Size
775KB
MD5
6a512e010bf8fd0a88016d990cb150c3
SHA1
c342531b677e080a57922add9d4f8aa8ca453b62
SHA256
5ddab1779b36604feaf80a524ea4b527e8fd5516fd4c519743193c71a6a68754
SHA512
cc4abf0fc3d719c4e0975fc9b2c7b0d230c1f5059cb054d44e5d316ee95521ba990f82db7f9f14b8861caf1eb305f2e45e21a5835a20434c4bb39de14e3fa7f7
SSDEEP
12288:NuKeE7eBJjThw+MutDJWSXqfkoJVtVhO4jTkTwZbUXpBtgifyH5a2D52mFEATsw/:Nu1YQThwK9WjlPG057522TsFMceJn
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\libcef\bugly-windows\out\x86\crashpad_handler.pdb
GetModuleFileNameW
GetFileInformationByHandleEx
GetCurrentProcess
RegisterWaitForSingleObject
GetQueuedCompletionStatus
WaitForSingleObject
DuplicateHandle
DisconnectNamedPipe
OpenProcess
PostQueuedCompletionStatus
CreateEventW
SetEvent
CreateThread
UnregisterWaitEx
CreateIoCompletionPort
ConnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
CreateFileW
GetVersion
TransactNamedPipe
WaitNamedPipeW
LoadLibraryW
GetProcAddress
FindClose
CloseHandle
TerminateProcess
ReleaseSemaphore
CreateSemaphoreW
ReadFile
GetFileSizeEx
GetStdHandle
WriteFile
SetEndOfFile
UnlockFileEx
SetFilePointerEx
LockFileEx
GetFileType
GetModuleHandleW
FormatMessageA
LocalFree
CreateDirectoryW
GetFileAttributesW
DeleteFileW
GetTimeZoneInformation
GetSystemInfo
IsProcessorFeaturePresent
VerSetConditionMask
VerifyVersionInfoW
GetProcessId
SuspendThread
ResumeThread
GetThreadContext
GetProcessTimes
GetSystemDefaultLCID
GetThreadLocale
GetUserDefaultLCID
GetPrivateProfileStringW
CreateProcessW
IsWow64Process
WriteProcessMemory
Sleep
VirtualAllocEx
ReadProcessMemory
SleepEx
IsDebuggerPresent
SizeofResource
MultiByteToWideChar
LockResource
FindResourceExW
IsDBCSLeadByte
LoadResource
FindResourceW
lstrcpyW
GetPrivateProfileSectionW
VirtualFree
VirtualAlloc
VirtualProtect
DeviceIoControl
SetLastError
WideCharToMultiByte
SwitchToThread
GetFullPathNameW
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
GetCurrentProcessId
GetLocalTime
OutputDebugStringW
FormatMessageW
GetCurrentThreadId
SetUnhandledExceptionFilter
GetProcessHeap
DeleteCriticalSection
GetCurrentDirectoryW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
HeapDestroy
InitializeCriticalSection
VirtualQueryEx
GetFileTime
RemoveDirectoryW
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleExW
ExitProcess
GetCommandLineW
GetCommandLineA
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetStartupInfoW
InitializeSListHead
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
GetCPInfo
GetStringTypeW
GetSystemTimeAsFileTime
InitOnceExecuteOnce
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
SetProcessShutdownParameters
HeapFree
CreateFileA
SetConsoleCtrlHandler
QueryPerformanceCounter
EncodePointer
LCMapStringEx
ImpersonateNamedPipeClient
RevertToSelf
BuildSecurityDescriptorW
ConvertStringSecurityDescriptorToSecurityDescriptorW
BuildExplicitAccessWithNameW
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
SystemFunction036
RegOpenKeyExA
CreateWindowExW
DestroyWindow
SetWindowLongW
DispatchMessageW
GetMessageW
GetWindowLongW
EnableWindow
TranslateMessage
RegisterClassW
DefWindowProcW
EndPaint
BeginPaint
InvalidateRect
LoadImageW
DialogBoxParamW
UnregisterClassW
PostMessageW
GetSysColorBrush
KillTimer
DrawIconEx
DrawTextW
GetDlgItem
GetClientRect
MapDialogRect
SendDlgItemMessageW
MapWindowPoints
SetDlgItemTextW
ClientToScreen
SetTimer
ShowWindow
SetWindowTextW
GetWindowTextLengthW
EndDialog
GetWindowTextW
GetWindowThreadProcessId
GetMenuItemCount
CreatePopupMenu
IsWindow
DestroyMenu
GetKeyState
CallWindowProcW
GetWindowRect
SetWindowPos
SendMessageW
TrackPopupMenu
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpReadData
WinHttpWriteData
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpConnect
WinHttpQueryHeaders
WinHttpCrackUrl
CallNtPowerInformation
StringFromCLSID
OleInitialize
CoCreateGuid
CoTaskMemFree
PathFileExistsW
PathRemoveFileSpecW
GdiplusStartup
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
DeleteObject
SetBkMode
SetTextColor
GetStockObject
CreateFontW
SelectObject
SHGetFileInfoW
ShellExecuteW
ord155
SHBindToParent
SHGetDesktopFolder
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ