Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220fN.exe
Resource
win7-20241010-en
Target
28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220fN.exe
Size
815KB
MD5
6f338b0d8b648b27f0e24cd039443710
SHA1
b4fae72c22350e439e3dbd17614c37a6ecfcdbda
SHA256
28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220f
SHA512
b034720321e33c0c930c0aa60cfede911b493fea3ad6ae19b8fb086254abfb72c2493b1616cc309a7ee02876d75457c0df90996fe030287d5b750ee614007b78
SSDEEP
24576:miOWmE9/SsSCpyaUk3qPb7hxavnMRGJ/qofTW:Bz9/SNCdUkELQB1qz
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\project\sogouime\branch\PinyinDev_R_8_1_NK_C3.0\Bin\SogouPdb\SogouInput\crashrpt.pdb
GetFileVersionInfoSizeA
GetFileVersionInfoW
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeW
VerQueryValueW
OpenMutexA
OutputDebugStringA
SetUnhandledExceptionFilter
CreateMutexA
FreeLibrary
MultiByteToWideChar
Sleep
CreateFileA
GetFileSize
ReadFile
GetSystemDirectoryA
GlobalMemoryStatusEx
GetModuleFileNameA
CreateDirectoryA
CopyFileA
CreateToolhelp32Snapshot
Process32First
CloseHandle
OpenProcess
Process32Next
GetModuleHandleA
SetFilePointer
VirtualQuery
CreateProcessW
GetCurrentProcess
GetModuleHandleW
WriteFile
LoadLibraryW
FormatMessageW
IsBadWritePtr
TerminateProcess
GetModuleFileNameW
CreateFileW
GetLocalTime
lstrcatW
IsDebuggerPresent
GetCurrentThreadId
GetCurrentProcessId
lstrcpyW
GetCommandLineW
GetSystemDirectoryW
GetTempPathW
OpenMutexW
Process32FirstW
Process32NextW
GetTempFileNameW
SystemTimeToFileTime
MoveFileExW
CreateDirectoryW
WaitForSingleObject
SetFileTime
GlobalAlloc
CopyFileW
GetExitCodeProcess
GetFileAttributesW
FileTimeToSystemTime
GlobalFree
GetProcessId
GetFileTime
DeleteFileW
SetFileAttributesW
SetLastError
ExitThread
CreateEventW
DuplicateHandle
ReadProcessMemory
CreateThread
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FindFirstFileW
GetLogicalDriveStringsW
FindClose
RemoveDirectoryW
QueryDosDeviceW
FindNextFileW
LocalAlloc
FlushFileBuffers
CreateMutexW
ReleaseMutex
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualAlloc
GetVersionExW
SetEvent
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
CreateFileMappingW
OpenFileMappingW
TerminateThread
TlsGetValue
InterlockedIncrement
InterlockedDecrement
lstrlenW
TlsAlloc
TlsFree
InterlockedExchange
InitializeCriticalSection
RaiseException
RtlUnwind
HeapFree
UnhandledExceptionFilter
HeapAlloc
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapReAlloc
FileTimeToLocalFileTime
GetDriveTypeW
ResumeThread
GetSystemTimeAsFileTime
GetCurrentThread
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
HeapDestroy
VirtualFree
FatalAppExitA
HeapSize
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
SetStdHandle
SetConsoleCtrlHandler
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetTimeZoneInformation
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
GetDriveTypeA
GetFullPathNameA
CompareStringA
CompareStringW
SetEnvironmentVariableA
WideCharToMultiByte
LoadLibraryA
GetProcAddress
GetLastError
LocalFree
TlsSetValue
RegQueryValueExW
RegOpenKeyW
RegSetValueExW
OpenProcessToken
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
LookupAccountSidW
RegEnumKeyW
RegEnumValueW
RegOpenKeyExW
RegFlushKey
RegEnumKeyExW
AddAccessAllowedAceEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
GetNamedSecurityInfoW
InitializeAcl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
SetEntriesInAclW
GetSecurityDescriptorSacl
BuildExplicitAccessWithNameW
GetLengthSid
SetSecurityDescriptorSacl
GetTokenInformation
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ImmDisableIME
GetProcessMemoryInfo
GetModuleInformation
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
HttpEndRequestA
HttpSendRequestA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
PeekMessageW
TranslateMessage
SystemParametersInfoW
GetDesktopWindow
SetWindowPos
MsgWaitForMultipleObjectsEx
SendMessageTimeoutW
FindWindowExW
GetWindowThreadProcessId
MessageBoxW
SetRectEmpty
GetSystemMetrics
wvsprintfW
DispatchMessageW
GetWindowRect
IsIconic
SetForegroundWindow
GetParent
AttachThreadInput
GetForegroundWindow
ShowWindow
GetWindowLongW
ShellExecuteExW
SHFileOperationW
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
CoInitialize
CoCreateInstance
CoUninitialize
VariantClear
VariantInit
SysFreeString
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ