Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
de6636da2635e77c29d6c1cbe4d7861607591faa1aa288d9f402711b6f54b6d9.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
de6636da2635e77c29d6c1cbe4d7861607591faa1aa288d9f402711b6f54b6d9.exe
Resource
win10v2004-20220721-en
Target
de6636da2635e77c29d6c1cbe4d7861607591faa1aa288d9f402711b6f54b6d9
Size
1.2MB
MD5
fcaab297c413cb5c061656ecda75d004
SHA1
cc79377e1ae8a21e1debaf524e721875a9afc58a
SHA256
de6636da2635e77c29d6c1cbe4d7861607591faa1aa288d9f402711b6f54b6d9
SHA512
3024c7aaf052bfbb3a7286ab81808a62f166fe928f1e5a2e57ded397602600fa2305a009233075d6c7d72a3767fbd5b6daefa0df844b222dbbdbe54ae96b48d0
SSDEEP
24576:VbJbIGB3LHQTrk6ZcHz6GX6JZJObz6yqKVvv/INbE63Ocp43B2Jv:VdIGB30TrLZcjX6JZJqzbrvz6ecp43B+
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateSemaphoreW
CreateThread
CreateToolhelp32Snapshot
CreateWaitableTimerA
DecodePointer
DeleteCriticalSection
DeleteFileA
DeleteFileW
DeviceIoControl
DosDateTimeToFileTime
DuplicateHandle
EncodePointer
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushConsoleInputBuffer
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetAtomNameA
GetCommandLineW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetEnvironmentStringsW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetFileTime
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLogicalDrives
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetProcessId
GetQueuedCompletionStatus
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathA
GetTempPathW
GetThreadPriority
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetVersion
GetVersionExA
GetVersionExW
GetVolumeInformationW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
HeapValidate
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
InterlockedPopEntrySList
InterlockedPushEntrySList
CreateSemaphoreA
IsProcessorFeaturePresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
LockFile
LockFileEx
LockResource
MapViewOfFile
MoveFileExW
MoveFileW
MulDiv
MultiByteToWideChar
OpenEventA
OpenFileMappingW
OpenMutexW
OpenProcess
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
Process32FirstW
Process32NextW
QueryPerformanceCounter
QueueUserAPC
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
SearchPathW
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetFileTime
SetLastError
SetThreadExecutionState
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SleepEx
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnlockFile
UnlockFileEx
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileSectionW
WriteProcessMemory
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
SetErrorMode
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
RtlUnwind
IsValidCodePage
GetOEMCP
GetCPInfo
SetHandleCount
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetCommandLineA
CreateProcessW
CreateMutexW
CreateMutexA
CreateIoCompletionPort
CreateHardLinkA
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CopyFileW
CompareStringW
CompareFileTime
CloseHandle
AreFileApisANSI
IsDebuggerPresent
AddVectoredExceptionHandler
AnyPopup
InSendMessage
GetOpenClipboardWindow
GetParent
GetWindowContextHelpId
GetMenuContextHelpId
GetMessageExtraInfo
IsIconic
GetSysColorBrush
LoadIconA
DestroyMenu
LoadCursorFromFileW
GetCaretBlinkTime
IsCharLowerW
IsWindowUnicode
GetKeyboardType
VkKeyScanA
GetKeyboardLayout
keybd_event
UnregisterHotKey
UnhookWindowsHookEx
SetWindowsHookExW
SetForegroundWindow
RegisterWindowMessageW
RegisterHotKey
PostMessageW
GetWindowThreadProcessId
GetLastActivePopup
GetKeyState
GetForegroundWindow
GetAsyncKeyState
DestroyIcon
CallNextHookEx
AttachThreadInput
PathToRegion
DeleteObject
GetDCBrushColor
GetBkColor
GetStockObject
UpdateColors
GetTextCharset
GetGraphicsMode
GetTextAlign
CloseFigure
CreateMetaFileW
EndDoc
CreateSolidBrush
UnrealizeObject
RegOpenKeyExA
OpenProcessToken
RegQueryValueExW
ExtractIconExW
SHGetFileInfoW
SHGetFolderPathW
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ