Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
0fe713faf94bed3424ce7c7ac576db24cbb50e989f87b6844865971aed98b24a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0fe713faf94bed3424ce7c7ac576db24cbb50e989f87b6844865971aed98b24a.exe
Resource
win10v2004-en-20220113
Target
0fe713faf94bed3424ce7c7ac576db24cbb50e989f87b6844865971aed98b24a
Size
202KB
MD5
beaf5e523e8e3e3fb9dc2a361cda0573
SHA1
b038caeed3466c07c5f473bfd6c5bd11e5afccf1
SHA256
0fe713faf94bed3424ce7c7ac576db24cbb50e989f87b6844865971aed98b24a
SHA512
f0692ff4b5b2278952806b183246a96077c893d2487c5023b56bbccfbd8d16f09dd9394aae8cc71d33ad8b3d9474f4e7825bcccc0f24029eaa753d131fc8a683
SSDEEP
3072:W2B7dBkk2GgrQCz+VGUbqPM902y8ydV1ETnJaEXV:Rj29z+VGUQM9U8QuVL
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileW
CreateProcessW
CreateThread
DecodePointer
DeleteCriticalSection
DuplicateHandle
EncodePointer
EnterCriticalSection
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDateFormatW
GetEnvironmentStringsW
GetFileType
GetLastError
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDefaultLangID
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatA
GetTimeFormatW
CreateEventW
GetVersionExA
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
LocalReAlloc
MultiByteToWideChar
OpenEventW
QueryPerformanceCounter
RaiseException
ResumeThread
RtlUnwind
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcpynA
lstrlenA
CreateEventA
CloseHandle
AreFileApisANSI
GetModuleHandleA
GetUserDefaultLCID
VirtualAlloc
GetSystemMenu
InvalidateRgn
PeekMessageA
SendDlgItemMessageA
TranslateAccelerator
GetMessageTime
DestroyWindow
DdeCreateStringHandleA
CreateIconFromResource
CreateDialogParamA
CharNextExA
GetTopWindow
GetDCEx
FlashWindow
EnableMenuItem
DispatchMessageA
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyA
SHCreateDirectoryExA
SHGetPathFromIDListW
StrCmpNIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ