Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
3551037b428548213f880ee755ca2390N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3551037b428548213f880ee755ca2390N.exe
Resource
win10v2004-20240802-en
Target
3551037b428548213f880ee755ca2390N.exe
Size
422KB
MD5
3551037b428548213f880ee755ca2390
SHA1
559ac9a2afd252e1e42c29d329272ab44cd889e8
SHA256
8a1bfbc22006c9c49579fb9e101c4a5fb75c071b13b05a743aa28e4541976461
SHA512
e310e2d2f969902ae7dd4746dab6c72ae7b86684334c903d70660a45fdfcefb178ceec491f17cb9d7aaf9813b35e71d5c425ef2e3277eb26c31af920c783feee
SSDEEP
3072:AYLf3GqW1ywnfwdiEu6+7UPToMVsPARgW/TCD5uSYzZPXQKlU2k7HoZ7WK7TxqNo:AirW1n4d//PTJOYRgsTxFxU27WGYhRnC
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\dev\projs\ProcessSupervisor\output\QuickUpgrade.pdb
GetLogicalProcessorInformationEx
GetActiveProcessorCount
GetActiveProcessorGroupCount
DecodePointer
InitializeCriticalSectionEx
CopyFileW
FreeLibrary
CreateThread
SetCurrentDirectoryW
CreateProcessW
DeleteCriticalSection
GetStartupInfoW
Sleep
OpenEventW
SetEvent
CreateEventW
GetLastError
MultiByteToWideChar
GetFileAttributesW
GetSystemInfo
GetModuleHandleW
LoadLibraryW
GetExitCodeProcess
ExitProcess
GetSystemTimeAsFileTime
RemoveDirectoryW
DeleteFileW
WaitForSingleObject
CloseHandle
WriteFile
CreateFileW
CreateDirectoryW
GetTempPathW
VerSetConditionMask
VerifyVersionInfoW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
LocalFree
WideCharToMultiByte
GetProcAddress
GetCurrentProcess
LoadLibraryExW
GetUserDefaultUILanguage
SetLastError
GetCurrentProcessId
OpenProcess
GetModuleFileNameW
WinExec
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
TerminateThread
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessTimes
TerminateProcess
IsDebuggerPresent
OutputDebugStringW
RaiseException
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
QueryPerformanceCounter
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetStdHandle
GetFileType
LCMapStringW
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
HeapDestroy
GetWindowThreadProcessId
MessageBoxW
DialogBoxParamW
GetDlgItem
SendMessageW
SetDlgItemTextW
GetWindow
IsWindowVisible
EnumWindows
CreateWindowExW
LoadStringW
PostMessageW
ShowWindow
EnableWindow
EndDialog
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
OpenProcessToken
GetTokenInformation
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegSetValueExW
GetSidSubAuthority
GetSidSubAuthorityCount
ChangeServiceConfigW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteExW
CoInitialize
SysFreeString
VariantClear
SysAllocString
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ