Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
eb5bbe3e89fe57a7d9005e540d389ff556864eb76e7691bc179339a876780556.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
eb5bbe3e89fe57a7d9005e540d389ff556864eb76e7691bc179339a876780556.exe
Resource
win10v2004-20220721-en
Target
eb5bbe3e89fe57a7d9005e540d389ff556864eb76e7691bc179339a876780556
Size
1.1MB
MD5
e846cb470214e8e74d6bede7fbe39642
SHA1
1d7c1698a4423479b39f96c3986ee7d00dbe96bf
SHA256
eb5bbe3e89fe57a7d9005e540d389ff556864eb76e7691bc179339a876780556
SHA512
0ac78212fcb0d1822b0e885c50db6fed2084997da42a77eafa7e814d334a9674a36173e8ea160653f5408db75cd2b5778bd2937885423ef4131d285a856ad4d3
SSDEEP
24576:ZzWuYg/8kz9ncHy/B5uwMp1p4pGj3m91dscI/s:ZCuYA8kZnpB5uw+1p44S91gs
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
EnumSystemLocalesA
EnumUILanguagesW
ExitProcess
ExitThread
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FatalAppExitA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceA
FindResourceW
FlushConsoleInputBuffer
FlushFileBuffers
FlushInstructionCache
FlushViewOfFile
FormatMessageA
FormatMessageW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
FreeResource
GetACP
GetAtomNameA
GetCPInfo
GetCPInfoExW
GetCommandLineA
GetCommandLineW
GetComputerNameA
GetComputerNameW
GetConsoleCP
GetConsoleMode
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetDriveTypeW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetFileTime
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoA
GetLocaleInfoW
GetLogicalDriveStringsW
GetLogicalDrives
GetLongPathNameW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetPriorityClass
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetProcessId
GetProfileStringW
GetQueuedCompletionStatus
GetShortPathNameW
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathA
GetTempPathW
GetThreadContext
GetThreadLocale
GetThreadPriority
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GetVersionExW
GetVolumeInformationW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAddAtomW
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomW
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
HeapValidate
EnumCalendarInfoA
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
InterlockedPopEntrySList
InterlockedPushEntrySList
IsBadReadPtr
IsBadWritePtr
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalSize
LockFile
LockFileEx
LockResource
MapViewOfFile
MoveFileExW
MoveFileW
MulDiv
MultiByteToWideChar
OpenEventA
OpenEventW
OpenFileMappingA
OpenFileMappingW
OpenMutexW
OpenProcess
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
Process32FirstW
Process32NextW
ProcessIdToSessionId
QueryDosDeviceW
QueryPerformanceCounter
QueryPerformanceFrequency
QueueUserAPC
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
RemoveDirectoryW
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
RtlUnwind
SearchPathW
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableA
SetEnvironmentVariableW
SetErrorMode
SetEvent
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetFileTime
SetHandleCount
SetLastError
SetProcessWorkingSetSize
SetStdHandle
SetThreadExecutionState
SetThreadLocale
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SignalObjectAndWait
SizeofResource
Sleep
SleepEx
SuspendThread
SwitchToThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnlockFile
UnlockFileEx
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualQuery
VirtualQueryEx
WaitForMultipleObjects
WaitForMultipleObjectsEx
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteConsoleW
WriteFile
WritePrivateProfileSectionW
WritePrivateProfileStringW
WriteProcessMemory
lstrcatW
lstrcmpA
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
EnterCriticalSection
EncodePointer
DuplicateHandle
DosDateTimeToFileTime
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
DecodePointer
CreateWaitableTimerW
CreateWaitableTimerA
CreateToolhelp32Snapshot
CreateThread
CreateSemaphoreW
CreateSemaphoreA
CreateRemoteThread
CreateProcessW
CreateProcessA
CreatePipe
CreateMutexW
CreateMutexA
CreateIoCompletionPort
CreateHardLinkA
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CreateDirectoryA
CopyFileW
CopyFileA
CompareStringW
CompareStringA
CompareFileTime
CloseHandle
CancelWaitableTimer
Beep
AreFileApisANSI
InitializeCriticalSection
AddVectoredExceptionHandler
DestroyMenu
InSendMessage
AnyPopup
GetOpenClipboardWindow
GetMessageExtraInfo
IsIconic
GetSysColorBrush
LoadIconA
GetKeyboardType
VkKeyScanA
GetKeyboardLayout
wsprintfW
keybd_event
UnregisterHotKey
UnhookWindowsHookEx
ShowCaret
SetWindowsHookExW
SetProcessDefaultLayout
SetKeyboardState
SetForegroundWindow
SetDeskWallpaper
SendDlgItemMessageW
RegisterWindowMessageW
RegisterHotKey
GetParent
OemToCharW
MapVirtualKeyExA
LoadStringW
IsCharAlphaNumericA
InvertRect
InvalidateRect
GetWindowThreadProcessId
GetWindowRgn
GetUpdateRect
GetMonitorInfoW
GetMenuState
GetLastActivePopup
GetKeyState
GetForegroundWindow
GetDlgItemTextW
GetDlgItem
GetClipboardSequenceNumber
GetAsyncKeyState
EnumDisplayMonitors
EndDialog
EnableWindow
DlgDirListW
DialogBoxParamW
DestroyIcon
CharUpperW
GetWindowContextHelpId
GetMenuContextHelpId
LoadCursorFromFileW
GetCaretBlinkTime
IsCharLowerW
PostMessageW
CallNextHookEx
AttachThreadInput
IsWindowUnicode
EngDeleteSemaphore
ExcludeClipRect
GdiConvertEnhMetaFile
GdiEntry16
GdiPlayEMF
GetArcDirection
GetDCBrushColor
GetDIBits
GetLogColorSpaceA
GetMetaFileA
GetMetaFileW
GetWinMetaFileBits
Pie
PolyTextOutA
Polyline
RoundRect
EngComputeGlyphSet
SetDCBrushColor
SetDCPenColor
SetDIBitsToDevice
SetFontEnumeration
GetStockObject
CloseFigure
CreateMetaFileW
UnrealizeObject
CreateSolidBrush
GetBkColor
EndDoc
UpdateColors
GetTextCharset
GetGraphicsMode
GetTextAlign
EngCheckAbort
DeviceCapabilitiesExW
STROBJ_bGetAdvanceWidths
CreateColorSpaceA
DeleteObject
RegOpenKeyExA
OpenProcessToken
RegQueryValueExW
CommandLineToArgvW
ExtractIconExW
SHGetFileInfoW
SHGetFolderPathW
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ