Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
5dc0d62f413d50f3cf877622723f1d02b89e911a0efcb1685c3ee1a3260c3966.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5dc0d62f413d50f3cf877622723f1d02b89e911a0efcb1685c3ee1a3260c3966.exe
Resource
win10v2004-20220721-en
Target
5dc0d62f413d50f3cf877622723f1d02b89e911a0efcb1685c3ee1a3260c3966
Size
1017KB
MD5
62afac80300c5b8891368983e01780fd
SHA1
a25d666d19e3c6de79127176ed8ef2f61d1d2c46
SHA256
5dc0d62f413d50f3cf877622723f1d02b89e911a0efcb1685c3ee1a3260c3966
SHA512
a3506727530f86d8c5b2d8b8b78423281d54eb42c6d37173fbcaa1d9db8571e19537c225c06d1b730a7b814c63cdf8946f0e19cdbd509280ab468af1591a0342
SSDEEP
24576:T/7TbYcDa6BSSEkmfSRmjNr0HmO0g9miDnP9GAcYJL4:T7TajSENNO79FDPzcYF4
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetCommandLineW
GetComputerNameExW
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDriveTypeW
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetQueuedCompletionStatus
GetStdHandle
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetVersionExA
GetVolumeInformationW
GetWindowsDirectoryW
GlobalFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MoveFileW
MultiByteToWideChar
OpenEventW
PostQueuedCompletionStatus
QueryPerformanceCounter
ReleaseSemaphore
FormatMessageW
ResumeThread
RtlUnwind
SetErrorMode
SetEvent
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpW
lstrlenW
VirtualAlloc
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
HeapReAlloc
HeapAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
HeapFree
VirtualFree
HeapCreate
FileTimeToSystemTime
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
ExitProcess
EnumUILanguagesW
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteCriticalSection
DecodePointer
CreateThread
CreateSemaphoreW
CreateIoCompletionPort
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
ResetEvent
CancelIo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetCommandLineA
CallWindowProcW
CharNextW
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
ExitWindowsEx
LoadIconA
UnregisterClassA
TranslateMessage
SetWindowLongW
SetTimer
SendMessageTimeoutW
RegisterClassW
RegisterClassExW
PostThreadMessageW
PostMessageW
PeekMessageW
MessageBoxW
LoadStringW
LoadCursorW
KillTimer
GetWindowLongW
GetMessageW
GetClassInfoExW
GetActiveWindow
FindWindowW
IsWindow
PathToRegion
GetStockObject
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExA
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
CoInitialize
CoCreateInstance
PathRemoveFileSpecW
SHGetValueW
StrCmpIW
StrCmpNIW
StrCpyNW
StrStrIA
StrStrIW
UrlGetPartA
wvnsprintfW
PathIsDirectoryW
PathFindFileNameW
PathFileExistsW
PathCombineW
PathAppendW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ