Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
42e39134ed0552e07d5890bbacec8b5f6e25d4205b69159ca8fbd975119a8783.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42e39134ed0552e07d5890bbacec8b5f6e25d4205b69159ca8fbd975119a8783.exe
Resource
win10v2004-20240802-en
Target
42e39134ed0552e07d5890bbacec8b5f6e25d4205b69159ca8fbd975119a8783
Size
742KB
MD5
cdb35d4f1941fc21dcb346d146a310ab
SHA1
e081f6f08565922d0714888d634f9c05d14a5af2
SHA256
42e39134ed0552e07d5890bbacec8b5f6e25d4205b69159ca8fbd975119a8783
SHA512
f0a586ccc922647211e6e790de1d26aa20a5d29aa34bcf95be4b0e693395bc957a278debdc30d6bce64663187a11e2bfd0f4a611b9c755cc050b191b6fedbc19
SSDEEP
12288:QDtUcgSXHnBCb34VUbx9PjVvx0VxnK75kT2gK+nV/PyYEcJU5AQYB:QpJKx9uxK75kT1V/PyYEcJUuQ8
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
e:\mailmaster\mailmaster\src\chromium\out\Release\initialexe\mailmaster.exe.pdb
CreateProcessAsUserW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
SystemFunction036
OpenProcessToken
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
LookupPrivilegeValueW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
UnregisterTraceGuids
GetAdaptersAddresses
GetAdaptersInfo
GetMappedFileNameW
GetActiveWindow
CharUpperW
CloseDesktop
RegisterWindowMessageW
CloseWindowStation
CreateDesktopW
GetThreadDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
SendMessageTimeoutW
FindWindowW
CreateEnvironmentBlock
DestroyEnvironmentBlock
WSAGetLastError
gethostbyname
inet_ntoa
WSAStartup
gethostname
InternetConnectW
InternetOpenW
InternetSetOptionW
FtpPutFileW
InternetCloseHandle
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
timeGetTime
PathFindFileNameW
RtlCaptureStackBackTrace
HeapSize
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
HeapReAlloc
HeapFree
HeapAlloc
ExitProcess
SetStdHandle
GetFullPathNameW
CloseHandle
GetLastError
CreateMutexW
CreateDirectoryW
lstrcpyW
lstrlenW
GetCurrentProcess
GetModuleHandleW
FreeLibrary
GetProcAddress
LoadLibraryExW
SetLastError
GetCurrentProcessId
GetSystemInfo
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
WriteFile
OutputDebugStringA
GetModuleFileNameW
CreateFileW
DeleteFileW
FormatMessageA
GetTickCount
GetCommandLineW
LocalFree
ReadFile
QueryDosDeviceW
GetLongPathNameW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
GetFileAttributesExW
GetCurrentDirectoryW
MoveFileExW
CopyFileW
GetTempFileNameW
SetThreadPriority
Sleep
GetCurrentThread
QueryPerformanceFrequency
GetThreadPriority
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetUserDefaultLangID
TerminateProcess
WaitForSingleObject
DuplicateHandle
OpenProcess
GetExitCodeProcess
SetInformationJobObject
SetHandleInformation
GetStdHandle
AssignProcessToJobObject
ResumeThread
CreateProcessW
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetCurrentThreadId
GetVersionExW
GetNativeSystemInfo
IsDebuggerPresent
RaiseException
CreateThread
FindFirstFileW
FindFirstFileExW
FindNextFileW
FindClose
GetProcessId
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
ExpandEnvironmentStringsW
GetModuleHandleA
CreateEventW
GetModuleHandleExW
SetEnvironmentVariableW
GetEnvironmentVariableW
RegisterWaitForSingleObject
UnregisterWaitEx
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
LoadLibraryW
GlobalMemoryStatusEx
HeapSetInformation
WaitForMultipleObjects
SetEvent
ResetEvent
VirtualQueryEx
RtlCaptureContext
ReleaseSemaphore
InitializeCriticalSection
SuspendThread
TerminateThread
GetThreadContext
CreateSemaphoreW
SetUnhandledExceptionFilter
GetDriveTypeW
VirtualAlloc
VirtualFree
ReleaseMutex
SwitchToThread
VirtualAllocEx
VirtualProtectEx
WriteProcessMemory
TerminateJobObject
GetUserDefaultLCID
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
ReadProcessMemory
DebugBreak
SearchPathW
GetConsoleMode
GetConsoleOutputCP
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
DecodePointer
FileTimeToSystemTime
EncodePointer
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryExA
VirtualQuery
VirtualProtect
CoTaskMemFree
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpReadData
WinHttpOpenRequest
WinHttpSendRequest
WinHttpOpen
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ