Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
50a07742633aa0d46b7d45d47291b9998c45641a80630a2f2c4e329c5d4432c9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
50a07742633aa0d46b7d45d47291b9998c45641a80630a2f2c4e329c5d4432c9.exe
Resource
win10v2004-20220901-en
Target
50a07742633aa0d46b7d45d47291b9998c45641a80630a2f2c4e329c5d4432c9
Size
1.9MB
MD5
6ed3de85ca64eb8fb265aa3635506a1c
SHA1
be2999d938518c71a843527c4e3a292e1672179d
SHA256
50a07742633aa0d46b7d45d47291b9998c45641a80630a2f2c4e329c5d4432c9
SHA512
e0c66a69fe36f3f32271d8c7e4b2c01d32388079b98ab3bbc0cd9aeb10e19ba7e12174f3c4c5cc5be5884de550722450a2af0dddd10d0f36115e1221e00a32b9
SSDEEP
49152:R8qx2M28eNU/i6egM8GHZTJpSRlZsZ/6Dmmlkps14x:OJM02/iVgMJIQ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetAdaptersInfo
GetProfilesDirectoryW
InternetCloseHandle
InternetSetOptionW
HttpSendRequestW
HttpOpenRequestW
UuidCreateSequential
LoadLibraryW
GetProcAddress
GetModuleFileNameW
GetModuleHandleW
GetCurrentProcessId
GetCurrentThreadId
FreeLibrary
Sleep
FileTimeToSystemTime
SystemTimeToFileTime
CloseHandle
OpenProcess
GetLastError
FindClose
CreateFileW
GetFileSize
GetFileSizeEx
ReadFile
SetFilePointer
WriteFile
SetEndOfFile
FlushFileBuffers
SetFileTime
InitializeCriticalSection
DeleteCriticalSection
LoadLibraryA
GetCurrentProcess
WaitForSingleObject
TerminateProcess
GetFullPathNameW
GetFullPathNameA
CreateFileA
CreateMutexW
HeapCompact
TryEnterCriticalSection
MapViewOfFile
UnmapViewOfFile
QueryPerformanceCounter
InterlockedCompareExchange
UnlockFile
LockFile
WaitForSingleObjectEx
OutputDebugStringW
GetTickCount
UnlockFileEx
GetSystemTimeAsFileTime
FormatMessageA
FormatMessageW
CopyFileW
GetFileAttributesA
HeapCreate
HeapValidate
GetFileAttributesW
LockFileEx
GetDiskFreeSpaceW
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetSystemInfo
GetFileAttributesExW
OutputDebugStringA
GetVersionExA
DeleteFileW
GetTempPathA
LocalFree
GetSystemTime
AreFileApisANSI
DeleteFileA
GetLocaleInfoW
GetVersion
CreateDirectoryW
CreateProcessW
WaitForMultipleObjects
TerminateThread
FlushViewOfFile
GetExitCodeProcess
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
GetModuleHandleA
GetFileType
GetStdHandle
GlobalMemoryStatus
FlushConsoleInputBuffer
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
GetTempPathW
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
MultiByteToWideChar
GetConsoleCP
GetTimeZoneInformation
SetFilePointerEx
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadConsoleW
SetStdHandle
WriteConsoleW
SetEnvironmentVariableA
GetVersionExW
TlsGetValue
TlsAlloc
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
SetConsoleCtrlHandler
GetModuleHandleExW
ExitProcess
IsDebuggerPresent
EncodePointer
GetStringTypeW
IsProcessorFeaturePresent
CreateThread
ExitThread
LoadLibraryExW
GetCommandLineW
GetKeyboardLayoutList
MessageBoxA
GetDesktopWindow
GetProcessWindowStation
GetUserObjectInformationW
EnumWindows
MessageBoxW
EnumChildWindows
FindWindowExW
GetClassNameW
LoadStringW
PostMessageW
GetWindowThreadProcessId
RegOpenKeyExW
RegisterEventSourceA
ReportEventA
DeregisterEventSource
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
LookupAccountSidW
RegDeleteKeyW
RegSetValueW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
ShellExecuteExW
CoCreateGuid
CoFreeUnusedLibraries
CoInitialize
CoUninitialize
CoSetProxyBlanket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ