Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
68b4a102a3199563b91e001621199f84f5e718c04d6270509d982a90615ce159.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
68b4a102a3199563b91e001621199f84f5e718c04d6270509d982a90615ce159.exe
Resource
win10v2004-20241007-en
Target
68b4a102a3199563b91e001621199f84f5e718c04d6270509d982a90615ce159
Size
815KB
MD5
9d8de7f33722a77ac277ceef27fd2dd2
SHA1
776312e87fed87f09c8d87186a2c04aa82571b11
SHA256
68b4a102a3199563b91e001621199f84f5e718c04d6270509d982a90615ce159
SHA512
73eaa21557305f1b4323596566f1bdb48b79361da50df5e9e3f8943dbb34a1179cf72510f517d67b2ecbfc8bb78925799b2d810d64f2830ec879a82efe5999fc
SSDEEP
24576:8iOTBLmE9/SsSCpBaUk3qPb7hxavnMRGJ/qofkF:XQD9/SNCKUkELQB1qLF
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\project\sogouime\branch\PinyinDev_R_8_1_NK_C3.0\Bin\SogouPdb\SogouInput\crashrpt.pdb
GetFileVersionInfoSizeA
GetFileVersionInfoW
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeW
VerQueryValueW
OpenMutexA
OutputDebugStringA
SetUnhandledExceptionFilter
CreateMutexA
FreeLibrary
MultiByteToWideChar
Sleep
CreateFileA
GetFileSize
ReadFile
GetSystemDirectoryA
GlobalMemoryStatusEx
GetModuleFileNameA
CreateDirectoryA
CopyFileA
CreateToolhelp32Snapshot
Process32First
CloseHandle
OpenProcess
Process32Next
GetModuleHandleA
SetFilePointer
VirtualQuery
CreateProcessW
GetCurrentProcess
GetModuleHandleW
WriteFile
LoadLibraryW
FormatMessageW
IsBadWritePtr
TerminateProcess
GetModuleFileNameW
CreateFileW
GetLocalTime
lstrcatW
IsDebuggerPresent
GetCurrentThreadId
GetCurrentProcessId
lstrcpyW
GetCommandLineW
GetSystemDirectoryW
GetTempPathW
OpenMutexW
Process32FirstW
Process32NextW
GetTempFileNameW
SystemTimeToFileTime
MoveFileExW
CreateDirectoryW
WaitForSingleObject
SetFileTime
GlobalAlloc
CopyFileW
GetExitCodeProcess
GetFileAttributesW
FileTimeToSystemTime
GlobalFree
GetProcessId
GetFileTime
DeleteFileW
SetFileAttributesW
SetLastError
ExitThread
CreateEventW
DuplicateHandle
ReadProcessMemory
CreateThread
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FindFirstFileW
GetLogicalDriveStringsW
FindClose
RemoveDirectoryW
QueryDosDeviceW
FindNextFileW
LocalAlloc
FlushFileBuffers
CreateMutexW
ReleaseMutex
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualAlloc
GetVersionExW
SetEvent
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
CreateFileMappingW
OpenFileMappingW
TerminateThread
TlsGetValue
InterlockedIncrement
InterlockedDecrement
lstrlenW
TlsAlloc
TlsFree
InterlockedExchange
InitializeCriticalSection
RaiseException
RtlUnwind
HeapFree
UnhandledExceptionFilter
HeapAlloc
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapReAlloc
FileTimeToLocalFileTime
GetDriveTypeW
ResumeThread
GetSystemTimeAsFileTime
GetCurrentThread
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
HeapDestroy
VirtualFree
FatalAppExitA
HeapSize
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
SetStdHandle
SetConsoleCtrlHandler
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetTimeZoneInformation
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
GetDriveTypeA
GetFullPathNameA
CompareStringA
CompareStringW
SetEnvironmentVariableA
WideCharToMultiByte
LoadLibraryA
GetProcAddress
GetLastError
LocalFree
TlsSetValue
RegQueryValueExW
RegOpenKeyW
RegSetValueExW
OpenProcessToken
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
LookupAccountSidW
RegEnumKeyW
RegEnumValueW
RegOpenKeyExW
RegFlushKey
RegEnumKeyExW
AddAccessAllowedAceEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
GetNamedSecurityInfoW
InitializeAcl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
SetEntriesInAclW
GetSecurityDescriptorSacl
BuildExplicitAccessWithNameW
GetLengthSid
SetSecurityDescriptorSacl
GetTokenInformation
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ImmDisableIME
GetProcessMemoryInfo
GetModuleInformation
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
HttpEndRequestA
HttpSendRequestA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
PeekMessageW
TranslateMessage
SystemParametersInfoW
GetDesktopWindow
SetWindowPos
MsgWaitForMultipleObjectsEx
SendMessageTimeoutW
FindWindowExW
GetWindowThreadProcessId
MessageBoxW
SetRectEmpty
GetSystemMetrics
wvsprintfW
DispatchMessageW
GetWindowRect
IsIconic
SetForegroundWindow
GetParent
AttachThreadInput
GetForegroundWindow
ShowWindow
GetWindowLongW
ShellExecuteExW
SHFileOperationW
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
CoInitialize
CoCreateInstance
CoUninitialize
VariantClear
VariantInit
SysFreeString
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ