Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
12352cb3fcd048e8b8dc1efe47e0a70456e1ef9d17724201dcfe70ad500c39b2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
12352cb3fcd048e8b8dc1efe47e0a70456e1ef9d17724201dcfe70ad500c39b2.exe
Resource
win10v2004-20220414-en
Target
12352cb3fcd048e8b8dc1efe47e0a70456e1ef9d17724201dcfe70ad500c39b2
Size
1.2MB
MD5
cf7ea57a75432d8e13f70aeb795a1158
SHA1
6a54de0ce4a1bae5de76608a09764103b3116656
SHA256
12352cb3fcd048e8b8dc1efe47e0a70456e1ef9d17724201dcfe70ad500c39b2
SHA512
16e08d4c88679ae67f91160a5c95f960080acef95f83179b155ca8dc466886c331d402e4b5fda128c9b9d50a7838e6472a29d93bad5b0c4175b3beb3d65fcfd4
SSDEEP
24576:W5ROpqXTVka+329klk0U6clClSbA0/45Pch8F6zwmnIWAjLTxb:Wi0Bm32AU6cQQYPcWwBJAjJb
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetPrivateProfileStructW
GetProcAddress
GetProcessHeap
GetProcessVersion
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GetWriteWatch
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LocalFree
LocalShrink
MapViewOfFile
GetOEMCP
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesW
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpyW
LoadLibraryW
VirtualAllocEx
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetFileType
GetFileSize
GetFileAttributesW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetConsoleCP
GetConsoleAliasesA
GetCommandLineA
GetCPInfo
GetACP
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FlushFileBuffers
ExitProcess
EnterCriticalSection
DeleteFileW
DeleteCriticalSection
CreateThread
CreateFileW
CreateFileMappingW
CompareStringW
CompareStringA
MoveFileExW
CloseHandle
DestroyIcon
GetSysColor
GetDC
GetListBoxInfo
IsWindowEnabled
InSendMessage
AnyPopup
GetMessageExtraInfo
GetSysColorBrush
GetDesktopWindow
GetMenuContextHelpId
GetMenuCheckMarkDimensions
GetActiveWindow
CharUpperW
GetWindowDC
CharLowerW
SetWindowWord
SetDlgItemTextW
MonitorFromRect
MessageBoxExW
LoadStringA
IsDialogMessageA
IMPGetIMEA
GetMenuItemInfoW
DrawStateA
DrawIcon
DdeDisconnect
DdeCreateDataHandle
DdeCmpStringHandles
ChangeDisplaySettingsExA
ArrangeIconicWindows
IsCharLowerA
EngCreatePalette
EngDeleteClip
EngStrokeAndFillPath
GdiAlphaBlend
GdiCreateLocalMetaFilePict
GdiGetLocalDC
GdiReleaseDC
GetClipRgn
GetPath
OffsetClipRgn
OffsetViewportOrgEx
XLATEOBJ_piVector
CreateICA
GetDCBrushColor
GetFontLanguageInfo
GetTextCharset
GetTextAlign
GetStretchBltMode
CreateCompatibleDC
CreateMetaFileA
PathToRegion
DeleteMetaFile
GetMapMode
GetStockObject
CloseEnhMetaFile
CopyMetaFileA
WidenPath
AnyLinkedFonts
CancelDC
RegOpenKeyExW
RegQueryValueExA
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ