Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
74f621ac47705aa9bc29f10aee92ac725284d3ae7813b6851c54485e422242d7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74f621ac47705aa9bc29f10aee92ac725284d3ae7813b6851c54485e422242d7.exe
Resource
win10v2004-20240802-en
Target
74f621ac47705aa9bc29f10aee92ac725284d3ae7813b6851c54485e422242d7
Size
1.6MB
MD5
88b2dde85ab628e55d9239110954e9e4
SHA1
ab74611d4864c4740c51a6a808c87d8634e3548e
SHA256
74f621ac47705aa9bc29f10aee92ac725284d3ae7813b6851c54485e422242d7
SHA512
1dc8fff301061c6d3f07c094876aab65f2d03eecf2bbfff7df3b4f9017dc00009961bd49860a537c21a556fc54ccd840cf1b5fa564c63467181b59683be60748
SSDEEP
49152:l25qIgyKHmy8910XsS0WwlTkaLqRrITEvM3QBP+dAWOTqIZCv+p:w5qIOncS0av
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\teamcity-agent\work\trunk_ninja_boot-x86\build.ninja\common\vs2017\x86\release\Installer\BootstrapperClient\BootstrapperClient.pdb
CallNtPowerInformation
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpWriteData
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpOpen
WinHttpCrackUrl
WinHttpSetOption
LocalFree
FormatMessageW
FindResourceA
VerifyVersionInfoW
GetSystemTimeAsFileTime
GetStdHandle
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceExW
RemoveDirectoryW
SetFileAttributesW
Sleep
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetCurrentThread
CreateProcessW
OpenProcess
GetSystemTime
GetLocalTime
GetTickCount
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FreeLibrary
GetModuleFileNameW
LoadLibraryW
lstrlenW
BeginUpdateResourceW
UpdateResourceA
EndUpdateResourceW
CopyFileW
SystemTimeToFileTime
GetGeoInfoW
GetUserGeoID
GetUserDefaultLCID
FreeConsole
AttachConsole
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
CreateSemaphoreA
WaitForSingleObjectEx
ReleaseSemaphore
DuplicateHandle
GetModuleHandleA
K32EnumProcesses
K32GetProcessImageFileNameW
GetCommandLineW
GetShortPathNameW
SetLastError
CreateSemaphoreW
IsDebuggerPresent
GetCurrentProcessId
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
IsWow64Process
QueryPerformanceCounter
QueryPerformanceFrequency
FileTimeToSystemTime
FlushFileBuffers
GetFileSizeEx
SetFileTime
lstrcpyW
MoveFileW
OpenEventA
GetFileTime
FormatMessageA
GetSystemInfo
WaitForMultipleObjectsEx
SetWaitableTimer
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateWaitableTimerA
GetFileType
HeapAlloc
InitializeCriticalSectionEx
CreateThread
GetExitCodeThread
GetVersion
LockFileEx
SetEndOfFile
UnlockFileEx
SetProcessShutdownParameters
SetConsoleCtrlHandler
GetProcessTimes
SuspendThread
GetProcessId
GetThreadContext
IsProcessorFeaturePresent
GetTimeZoneInformation
GetThreadLocale
GetSystemDefaultLCID
InitializeCriticalSection
VirtualQueryEx
ReadProcessMemory
SetNamedPipeHandleState
TransactNamedPipe
CreateNamedPipeW
WaitNamedPipeW
SetFilePointerEx
FindFirstFileExW
ConnectNamedPipe
DisconnectNamedPipe
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
UnregisterWaitEx
RegisterWaitForSingleObject
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
InitOnceExecuteOnce
HeapDestroy
ExitProcess
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
GetModuleHandleExW
ExitThread
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetCommandLineA
RtlUnwind
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
VirtualFree
VirtualProtect
VirtualAlloc
LoadLibraryExW
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
RaiseException
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
GetStartupInfoW
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
SwitchToThread
EncodePointer
GetTempPathW
WriteFile
ReadFile
GetFileSize
VerSetConditionMask
GetCurrentThreadId
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
GetFileAttributesW
CreateFileW
CreateDirectoryW
DeleteCriticalSection
GetProcessHeap
HeapSize
HeapFree
GetVersionExW
SleepEx
HeapReAlloc
DecodePointer
MulDiv
CreateEventA
WideCharToMultiByte
MultiByteToWideChar
lstrcmpW
GetProcAddress
GetModuleHandleW
OpenEventW
CreateEventW
CreateMutexW
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetLastError
CloseHandle
DeleteFileW
IsValidLocale
EnumSystemLocalesW
SetStdHandle
GetCurrentDirectoryW
GetFullPathNameW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
SetUnhandledExceptionFilter
IsWindowVisible
DrawTextW
LoadBitmapW
FillRect
GetWindowTextW
SetForegroundWindow
PostMessageW
EndPaint
EnableWindow
KillTimer
SetTimer
GetDlgCtrlID
DestroyWindow
RegisterClassW
PostQuitMessage
CharUpperW
CharNextW
AllowSetForegroundWindow
MessageBoxExW
SendMessageW
DefWindowProcW
CallWindowProcW
CreateWindowExW
ShowWindow
GetDC
InvalidateRect
GetWindowRect
MessageBoxW
GetWindowLongW
SetWindowLongW
GetParent
UnregisterClassW
GetMessageW
TranslateMessage
DispatchMessageW
PostThreadMessageW
LoadAcceleratorsW
TranslateAcceleratorW
SetWindowTextW
BeginPaint
GetSystemMetrics
GetDlgItem
MessageBoxA
LoadIconW
EnumWindows
GetWindowThreadProcessId
ReleaseDC
SetTextColor
SetBkMode
SetDCPenColor
SetDCBrushColor
CreateFontW
RoundRect
Rectangle
GetStockObject
CreatePen
GetDeviceCaps
DeleteObject
CreateSolidBrush
SelectObject
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathAndSubDirW
ShellExecuteExW
Shell_NotifyIconW
Shell_NotifyIconA
ord165
CoCreateGuid
StringFromGUID2
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
SysStringLen
VariantInit
VariantClear
CryptGetHashParam
RegEnumKeyExW
RegDeleteKeyExW
RegDeleteKeyW
GetUserNameW
OpenProcessToken
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegFlushKey
RegOpenKeyExA
RegQueryInfoKeyW
RegQueryValueExA
GetTokenInformation
CryptCreateHash
CryptHashData
CryptDestroyHash
BuildSecurityDescriptorW
BuildExplicitAccessWithNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ImpersonateNamedPipeClient
RevertToSelf
SystemFunction036
CryptAcquireContextW
CryptReleaseContext
RegEnumValueW
PathAddBackslashW
HashData
SHDeleteKeyW
StrCmpNW
StrStrW
StrCmpW
PathFileExistsW
PathRemoveExtensionW
SHCopyKeyW
PathAppendW
PathRemoveFileSpecW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
GetAdaptersInfo
IsNetworkAlive
HttpQueryInfoW
HttpQueryInfoA
HttpEndRequestW
HttpSendRequestExW
InternetOpenW
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetWriteFile
InternetQueryDataAvailable
HttpOpenRequestW
InternetQueryOptionW
InternetSetOptionW
HttpAddRequestHeadersA
HttpAddRequestHeadersW
HttpSendRequestW
freeaddrinfo
getaddrinfo
inet_ntoa
closesocket
connect
htons
send
sendto
WSAStartup
WSACleanup
WSAGetLastError
socket
InitCommonControlsEx
ord345
_TrackMouseEvent
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateHBITMAPFromBitmap
GdipAlloc
timeSetEvent
timeGetDevCaps
timeBeginPeriod
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ