Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
ebdbaf19be0e59f84d702b5b0e8d889723163769e3c312f6e82b8a9ae083a808.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ebdbaf19be0e59f84d702b5b0e8d889723163769e3c312f6e82b8a9ae083a808.exe
Resource
win10v2004-20240802-en
Target
ebdbaf19be0e59f84d702b5b0e8d889723163769e3c312f6e82b8a9ae083a808
Size
5.6MB
MD5
6efd6442c6f960486e05b7cb5dae50c3
SHA1
2171f16d2c9099bf35c3572de6203bfc86ddd16e
SHA256
ebdbaf19be0e59f84d702b5b0e8d889723163769e3c312f6e82b8a9ae083a808
SHA512
8e9fc5b5973e11730dd6af59cd8e4c3c6491270399e572c80ed3d401081b4b0867de5180735d4c4b135f35cf5ddbbabcf8d585c095990e1ead8057afcb7d7b49
SSDEEP
98304:kcfLLDqBBrAHV9TA0o/mtkEetULOUZj2t:vDUrw9TQmtkLcOE2t
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
e:\se7\tools\syzygy\release_syzygy\360se.pdb
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
GetModuleFileNameExW
GetModuleInformation
GetProcessImageFileNameW
SHGetValueA
SHStrDupW
PathFindFileNameW
PathAddBackslashW
PathFindExtensionW
StrStrIW
PathIsDirectoryW
StrStrW
PathIsRootW
PathRemoveFileSpecW
PathFileExistsW
SHGetValueW
PathAppendW
SHRegGetPathW
StrCmpIW
PathIsUNCW
PathIsURLW
StrCmpW
SHSetValueW
SHDeleteKeyW
LocalFree
FormatMessageW
CreateThread
DeleteCriticalSection
GetModuleHandleA
CreateEventW
GetExitCodeThread
MultiByteToWideChar
GetFileAttributesW
InitializeCriticalSectionAndSpinCount
OpenProcess
SetEvent
WaitForSingleObject
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
FreeLibrary
VirtualProtect
CreateFileW
ReadFile
GetFileSize
GetCurrentThreadId
lstrcmpiW
GlobalFree
EnterCriticalSection
SetLastError
InterlockedExchange
RaiseException
FlushInstructionCache
GlobalUnlock
lstrlenW
WritePrivateProfileStringW
LeaveCriticalSection
SizeofResource
GlobalAlloc
GlobalLock
LoadResource
FindResourceW
FreeResource
GetCurrentProcessId
CloseHandle
InterlockedExchangeAdd
GetLastError
TerminateProcess
Sleep
CreateRemoteThread
GetTickCount
InterlockedCompareExchange
SetUnhandledExceptionFilter
CreateProcessW
SetErrorMode
GetEnvironmentVariableW
SetEnvironmentVariableA
GetEnvironmentVariableA
GetCommandLineW
GetProcAddress
GetModuleFileNameW
GetVersionExW
LoadLibraryW
GetCurrentThread
GetModuleHandleW
GetCurrentProcess
VirtualQuery
GetPrivateProfileIntW
SetCurrentDirectoryW
CompareStringW
GetFullPathNameW
GetTimeZoneInformation
LockResource
MulDiv
GlobalSize
HeapWalk
HeapLock
HeapUnlock
GetSystemTime
OutputDebugStringW
GetFileSizeEx
LocalFileTimeToFileTime
HeapDestroy
InterlockedPopEntrySList
GetProcessHeap
InterlockedPushEntrySList
CreateFileA
Module32Next
Module32First
SwitchToThread
HeapSize
HeapCreate
HeapFree
HeapAlloc
HeapReAlloc
lstrlenA
lstrcpyW
IsBadReadPtr
FindResourceExW
lstrcpynW
ReadProcessMemory
DebugBreak
SearchPathW
OpenEventW
CreateNamedPipeW
CreateJobObjectW
VirtualFreeEx
SignalObjectAndWait
GetProcessHandleCount
TerminateJobObject
WriteProcessMemory
VirtualProtectEx
VirtualAllocEx
OpenThread
ReleaseSemaphore
VirtualQueryEx
RtlCaptureContext
WaitForMultipleObjects
ResetEvent
CreateIoCompletionPort
PostQueuedCompletionStatus
GetQueuedCompletionStatus
CreateToolhelp32Snapshot
UnregisterWaitEx
RegisterWaitForSingleObject
GetProcessId
SetFilePointerEx
SetEndOfFile
GetWindowsDirectoryW
DeviceIoControl
lstrcmpiA
LocalAlloc
LoadLibraryA
UnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
VirtualAlloc
GetSystemInfo
GetSystemTimeAsFileTime
ExitProcess
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
WideCharToMultiByte
WriteFile
GetStdHandle
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
SetFilePointer
GetConsoleCP
GetConsoleMode
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
RtlUnwind
SetStdHandle
WriteConsoleW
FlushFileBuffers
OpenMutexW
FindFirstFileW
GetDriveTypeW
CreateDirectoryW
GetExitCodeProcess
FindClose
RemoveDirectoryW
FindNextFileW
GetUserDefaultUILanguage
DeleteFileW
SetFileAttributesW
DuplicateHandle
VirtualFree
GetThreadContext
SetThreadContext
SuspendThread
ResumeThread
GetUserDefaultLangID
ExpandEnvironmentStringsW
SetInformationJobObject
SetHandleInformation
AssignProcessToJobObject
SetEnvironmentVariableW
InitializeCriticalSection
CopyFileW
WritePrivateProfileStructW
GlobalMemoryStatusEx
CreateMutexW
ReleaseMutex
MapViewOfFile
ReplaceFileW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
MoveFileW
CreateFileMappingW
QueryDosDeviceW
GetFileAttributesExW
GetNativeSystemInfo
GetSystemDirectoryW
GetModuleHandleExW
GetDiskFreeSpaceExW
SystemTimeToFileTime
QueryPerformanceFrequency
lstrcmpA
SetWorldTransform
CreatePatternBrush
RectVisible
ExtTextOutW
SetBkColor
FillRgn
Rectangle
LineTo
MoveToEx
CreatePen
GetTextExtentPoint32W
CombineRgn
SetWindowOrgEx
GdiAlphaBlend
EqualRgn
CreateRectRgn
SetViewportOrgEx
CreateRectRgnIndirect
SetGraphicsMode
ExcludeClipRect
RestoreDC
IntersectClipRect
SaveDC
GetRgnBox
GetObjectW
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
DeleteObject
SetBkMode
SetDIBColorTable
GetDeviceCaps
CreateFontIndirectW
CreateDIBSection
DeleteDC
SetTextColor
BitBlt
CreateSolidBrush
OffsetRgn
SelectClipRgn
LPtoDP
GetCurrentObject
SetLayout
GetLayout
GetRandomRgn
SetBrushOrgEx
GetStockObject
ModifyWorldTransform
CreateRoundRectRgn
OffsetViewportOrgEx
StretchBlt
SetStretchBltMode
GetObjectType
DuplicateTokenEx
GetSecurityInfo
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegSetValueExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExA
SetEntriesInAclW
RegQueryInfoKeyW
RegCreateKeyExW
OpenProcessToken
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
DuplicateToken
EqualSid
CreateRestrictedToken
CreateWellKnownSid
CopySid
GetLengthSid
ConvertStringSidToSidW
SetTokenInformation
SetThreadToken
RevertToSelf
RegDisablePredefinedCache
GetTokenInformation
CreateProcessAsUserW
LookupPrivilegeValueW
GetSystemMenu
DrawFrameControl
CreateIconFromResourceEx
WindowFromDC
UnregisterClassA
SetLayeredWindowAttributes
SetRect
IsDialogMessageW
CheckMenuItem
UpdateLayeredWindow
EnableWindow
IsChild
TrackMouseEvent
SetParent
GetCaretPos
GetMenuState
GetMessagePos
GetDoubleClickTime
RegisterClipboardFormatW
GetAsyncKeyState
ClientToScreen
GetMenuItemRect
MenuItemFromPoint
SubtractRect
LoadIconW
GetWindowDC
GetPropW
TrackPopupMenu
TrackPopupMenuEx
GetGUIThreadInfo
InsertMenuItemW
InvalidateRgn
FlashWindowEx
DeleteMenu
SetMenuItemInfoW
GetMessageW
FindWindowW
SendMessageTimeoutW
RegisterClassW
wsprintfW
PostMessageW
MsgWaitForMultipleObjects
WindowFromPoint
TranslateMessage
PeekMessageW
GetWindowThreadProcessId
DispatchMessageW
EndPaint
DestroyWindow
SetCursor
GetWindowTextLengthW
ScreenToClient
GetWindowRect
CharNextW
FillRect
SetCapture
DrawTextW
GetFocus
DialogBoxParamW
GetParent
LoadCursorW
IsWindowEnabled
GetClientRect
SetFocus
SetRectEmpty
BeginPaint
PtInRect
CreateIconIndirect
GetDC
GetCapture
DrawFocusRect
OffsetRect
InvalidateRect
GetWindowLongW
GetWindowTextW
GetClassNameW
ReleaseDC
MonitorFromWindow
GetDlgItem
SetWindowLongW
EndDialog
GetSysColor
SetWindowPos
GetCursorPos
GetActiveWindow
IsWindow
CreateWindowExW
ReleaseCapture
SendMessageW
MapWindowPoints
UpdateWindow
GetDlgCtrlID
SetWindowTextW
DestroyIcon
GetMonitorInfoW
CallWindowProcW
DefWindowProcW
GetWindow
MessageBoxW
AdjustWindowRectEx
EnableMenuItem
GetDesktopWindow
MoveWindow
SetForegroundWindow
CharUpperW
ShowWindow
GetSystemMetrics
SystemParametersInfoW
GetKeyState
RegisterClassExW
KillTimer
PostQuitMessage
SetTimer
CloseDesktop
CloseWindowStation
GetUserObjectInformationW
GetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetIconInfo
DrawIconEx
PrintWindow
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
IsClipboardFormatAvailable
GetClipboardData
LoadStringW
CopyRect
InSendMessageEx
ReplyMessage
SetWindowPlacement
GetWindowPlacement
GetForegroundWindow
MonitorFromPoint
InflateRect
RegisterWindowMessageW
HideCaret
DestroyAcceleratorTable
SendNotifyMessageW
TranslateAcceleratorW
GetClassInfoExW
MonitorFromRect
SetActiveWindow
IsIconic
IsWindowVisible
RedrawWindow
IsZoomed
SetPropW
EndMenu
IsRectEmpty
EqualRect
SetWindowRgn
LoadMenuW
GetSubMenu
IntersectRect
GetWindowRgn
LoadImageW
BringWindowToTop
RemovePropW
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
CreateDialogParamW
CreatePopupMenu
GetMenuItemCount
GetMenuItemInfoW
GetMenuStringW
DestroyMenu
ImageList_Add
ImageList_Create
ImageList_Remove
ImageList_Destroy
ImageList_Draw
ImageList_GetImageCount
ImageList_GetIconSize
InitCommonControlsEx
_TrackMouseEvent
GdiplusStartup
GdipCreateFromHDC
GdipDrawImageRectI
GdipCreateBitmapFromScan0
GdipLoadImageFromStream
GdipGetImageWidth
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipGetImagePixelFormat
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImageHeight
GdipCloneImage
GdipGetImagePaletteSize
GdipBitmapLockBits
GdipDisposeImage
GdipAlloc
GdipDrawImageI
GdipBitmapUnlockBits
GdipGetImageGraphicsContext
GdipImageGetFrameDimensionsCount
GdipDeleteGraphics
GdipFree
GdiplusShutdown
CreateEnvironmentBlock
DestroyEnvironmentBlock
Netbios
timeSetEvent
timeGetDevCaps
timeBeginPeriod
timeGetTime
timeEndPeriod
timeKillEvent
ChooseColorW
ImmSetCandidateWindow
ImmGetContext
ImmReleaseContext
ClearCrashKeyValueImpl
CrashForException
CrashMessageBox
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SPLG
SetClientId
SetCrashKeyValueImpl
SetExperimentList3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ