Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
Target
tmp
Size
422KB
MD5
3d1d048187f54d5961817a5866042e13
SHA1
1fa3c9856f49ebe802f81062a0030482ea24bf68
SHA256
41be5f61865ee6502ddad6af8bdfc5c5c1fe132e555cddd19634fef1c6068dc5
SHA512
1ae633293fe4ae369efe5f611af617305fceb3c7b6215827e6f428f668dada5f40e9d1a9511243250bc64de095556d696f891d40979c5e0f5a94d6be0a409748
SSDEEP
6144:3o+gOu4zscAqjWF3sCTTbsuWy4lt2gfZz5yX3Fz772uGCLJ+hU+M0kRot:3o+tdfViF8CTTbsLtzSX3J772uGu+eA
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetDefaultCommConfigA
SetPriorityClass
SetThreadContext
GetConsoleAliasesLengthW
CopyFileExW
GetConsoleAliasExesA
GetDriveTypeW
MoveFileExA
DebugActiveProcessStop
lstrcpynA
GetConsoleAliasExesLengthA
FindResourceW
BuildCommDCBAndTimeoutsA
SetDllDirectoryW
InterlockedIncrement
_lwrite
VerSetConditionMask
ReadConsoleA
InterlockedDecrement
GetCurrentActCtx
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
GetModuleHandleExW
SetConsoleScreenBufferSize
InterlockedCompareExchange
WriteConsoleInputA
GetComputerNameW
GetLogicalDrives
CallNamedPipeW
FreeEnvironmentStringsA
GetProcessPriorityBoost
GetTickCount
GetPrivateProfileStringW
ReadConsoleOutputA
GetDateFormatA
GetCommandLineA
CreateActCtxW
EnumResourceTypesA
GetPrivateProfileIntA
GetSystemDirectoryW
AddRefActCtx
TerminateThread
CopyFileW
AssignProcessToJobObject
GetCalendarInfoA
ReadProcessMemory
GetSystemWow64DirectoryW
FormatMessageW
GetSystemTimeAdjustment
GetVersionExW
GetFileAttributesA
WritePrivateProfileStructW
GetConsoleAliasW
GetWriteWatch
GetBinaryTypeA
TerminateProcess
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
CreateFileW
SetComputerNameExW
GetOverlappedResult
GetFileSize
GetVolumePathNameA
lstrlenW
FindNextVolumeMountPointW
CreateMailslotW
DisconnectNamedPipe
GlobalUnfix
ReleaseActCtx
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetHandleInformation
GetLastError
GetLongPathNameW
ReadConsoleOutputCharacterA
CreateNamedPipeA
EnumDateFormatsExA
WriteProfileSectionA
CopyFileA
SetComputerNameA
DisableThreadLibraryCalls
DefineDosDeviceA
ResetEvent
OpenWaitableTimerA
GetLocalTime
GetAtomNameA
LoadLibraryA
WriteConsoleA
ProcessIdToSessionId
InterlockedExchangeAdd
LocalAlloc
SetCalendarInfoW
WritePrivateProfileStringA
MoveFileA
GetExitCodeThread
SetCurrentDirectoryW
HeapLock
Module32FirstW
GetTapeParameters
FoldStringA
SetSystemTime
GlobalWire
FindNextFileA
GetModuleHandleA
FindFirstChangeNotificationA
CreateWaitableTimerW
lstrcatW
GetStringTypeW
GetConsoleTitleW
BuildCommDCBA
VirtualProtect
EnumDateFormatsW
OutputDebugStringA
SetThreadAffinityMask
EndUpdateResourceA
ReadConsoleInputW
CloseHandle
DeleteFileW
GetCurrentProcessId
DebugBreak
FindActCtxSectionStringW
GetProfileSectionW
GetACP
UnregisterWait
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WideCharToMultiByte
GetCurrentProcess
IsDebuggerPresent
GetModuleFileNameW
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleW
GetProcAddress
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
WriteConsoleW
GetFileType
OutputDebugStringW
LoadLibraryW
SetHandleCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetStringTypeA
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetStdHandle
GetConsoleOutputCP
GetLocaleInfoW
CreateFileA
DeleteFileA
ImpersonateNamedPipeClient
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ