Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
88761b80a530df67c6638ddef0fbc56377fde75113c1f4f9f97fa92bd6604c5aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88761b80a530df67c6638ddef0fbc56377fde75113c1f4f9f97fa92bd6604c5aN.exe
Resource
win10v2004-20241007-en
Target
88761b80a530df67c6638ddef0fbc56377fde75113c1f4f9f97fa92bd6604c5aN
Size
4.3MB
MD5
aafee29309cd19a7627a1019d07df2a0
SHA1
594d942ca231bcc00c1752edfe1df4fd80a73b4b
SHA256
88761b80a530df67c6638ddef0fbc56377fde75113c1f4f9f97fa92bd6604c5a
SHA512
da0463abcadd8a4cad4705c368983414c4bb15ddbc2f1e012e91b7c250026308458af0e57518b26deff5dbec86b77975121f63782f083fd0690ff54b2d58d4bb
SSDEEP
49152:xtY4be4yHQp0+6N/zdzQiHbTTOtjDvdpiryXkp8oL+bzxGMzvrT11:xVa/rytjpLT11
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\T\BuildResults\bin\Release_x64\AcroCEF\AcroCEF.pdb
CreateFileMappingW
MapViewOfFile
ReadProcessMemory
GetCurrentProcessorNumber
SetThreadAffinityMask
GetProcessHeaps
ExpandEnvironmentStringsW
LoadLibraryW
GetCurrentProcessId
LoadLibraryExW
FreeLibrary
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameW
GetCurrentDirectoryW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
CreateJobObjectW
QueryInformationJobObject
CreateNamedPipeW
VirtualAllocEx
VirtualProtectEx
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
UnmapViewOfFile
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
VirtualFreeEx
GetProcessHandleCount
FindResourceW
SizeofResource
LoadResource
LockResource
CreateDirectoryW
SetCurrentDirectoryW
TlsGetValue
lstrlenW
DebugBreak
SetFilePointerEx
WriteProcessMemory
SetEndOfFile
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
GetWindowsDirectoryW
TlsAlloc
TlsFree
TlsSetValue
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
CreateRemoteThread
WideCharToMultiByte
MultiByteToWideChar
VirtualQuery
InitializeConditionVariable
SleepConditionVariableSRW
WakeAllConditionVariable
WakeConditionVariable
RtlLookupFunctionEntry
RtlVirtualUnwind
ExitThread
RtlUnwind
GetExitCodeThread
AreFileApisANSI
DeviceIoControl
GetEnvironmentVariableW
TryEnterCriticalSection
CreateEventA
CancelIoEx
DisconnectNamedPipe
ConnectNamedPipe
CancelSynchronousIo
AssignProcessToJobObject
LocalFree
SetHandleInformation
GetFileType
SetEnvironmentVariableW
FreeEnvironmentStringsW
FreeLibraryAndExitThread
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
OutputDebugStringW
HeapSize
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetThreadPriority
SetThreadPriority
GetThreadId
RaiseException
IsDebuggerPresent
Sleep
UnregisterWaitEx
ReleaseSRWLockExclusive
TryAcquireSRWLockExclusive
IsWow64Process
GetNativeSystemInfo
GetProductInfo
GetVersionExW
GetTickCount
HeapDestroy
EnumSystemLocalesEx
GetUserDefaultLocaleName
GetUserDefaultLCID
GetUserDefaultLangID
TerminateProcess
GetCurrentThreadId
DuplicateHandle
SetInformationJobObject
GetModuleHandleExW
PostQueuedCompletionStatus
TerminateJobObject
UnregisterWait
RegisterWaitForSingleObject
SetEvent
GetQueuedCompletionStatus
ResetEvent
SetLastError
CreateEventW
CreateIoCompletionPort
GetCurrentThread
GetModuleHandleA
GetSystemInfo
VerifyVersionInfoW
SetDllDirectoryW
GetProcAddress
GetModuleHandleW
VirtualFree
VirtualAlloc
CreateThread
ExitProcess
GetCurrentProcess
CreateMutexW
WaitForSingleObject
ReleaseMutex
HeapSetInformation
GetProcessHeap
GetLastError
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetCommandLineW
GetFileSizeEx
VerSetConditionMask
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
HeapReAlloc
HeapAlloc
HeapFree
WriteConsoleW
GetStdHandle
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
RtlUnwindEx
RtlPcToFileHeader
InitializeSListHead
IsProcessorFeaturePresent
GetStartupInfoW
VirtualProtect
LoadLibraryExA
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
FormatMessageW
LocalAlloc
TerminateThread
FindFirstFileW
SwitchToThread
CreateFileMappingA
MapViewOfFileEx
OpenFileMappingA
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
SleepConditionVariableCS
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
RtlCaptureContext
UnhandledExceptionFilter
GetSystemMetrics
CloseWindowStation
CloseDesktop
GetThreadDesktop
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
GetProcessWindowStation
GetUserObjectInformationW
GetSidSubAuthorityCount
GetTokenInformation
DuplicateToken
SystemFunction036
GetSecurityDescriptorDacl
GetNamedSecurityInfoW
ImpersonateLoggedOnUser
FreeSid
AddMandatoryAce
InitializeAcl
SetEntriesInAclW
BuildTrusteeWithSidW
SetSecurityInfo
GetSecurityInfo
AdjustTokenPrivileges
LookupPrivilegeValueW
CreateRestrictedToken
RegQueryValueExW
RegCreateKeyExW
SetThreadToken
CreateProcessAsUserW
EqualSid
ConvertSidToStringSidW
ConvertStringSidToSidW
CreateWellKnownSid
GetLengthSid
IsValidSid
GetSidSubAuthority
InitializeSid
AccessCheck
MapGenericMask
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
GetSecurityDescriptorSacl
OpenProcessToken
SetTokenInformation
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetUserNameW
RegOpenKeyA
ConvertStringSecurityDescriptorToSecurityDescriptorW
SHGetFolderPathW
SHGetKnownFolderPath
CommandLineToArgvW
CoTaskMemFree
GetProcessMemoryInfo
GetHandleVerifier
GetMainTargetServices
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ