Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
63c7adeeaeee43416ae5543990b7c1eaa4582a24579ceccba85d2011c3ed726a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
63c7adeeaeee43416ae5543990b7c1eaa4582a24579ceccba85d2011c3ed726a.exe
Resource
win10v2004-20221111-en
Target
63c7adeeaeee43416ae5543990b7c1eaa4582a24579ceccba85d2011c3ed726a
Size
83KB
MD5
0226201961c2c41ffd9190b1c4831a70
SHA1
8c6fa2d662c2a26c3b50b46913d52eae1fa4ca7a
SHA256
63c7adeeaeee43416ae5543990b7c1eaa4582a24579ceccba85d2011c3ed726a
SHA512
6f32944602f740fb0fca1cdcfd6c97ad4c46ee7ef22cc889c47dc95e46b932a8ea63a6eb103267d645cd0db5907f41377b3d436d752b66bc06eb76c79ce4b10b
SSDEEP
1536:s2Vw8puOGyDWS+N0QTDgFil5qBmId5sPNe9vMtupnaH:sEwbFyDWKQs+qBmId5sFe9EtupnG
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentThread
GetProcessHeap
GetUserGeoID
GetSystemWindowsDirectoryA
GetACP
GetLastError
GetThreadLocale
VirtualAlloc
GetLocalTime
AddVectoredExceptionHandler
GetVersion
lstrcpyA
HeapReAlloc
HeapAlloc
GetStringTypeW
MultiByteToWideChar
GetSystemDefaultLCID
HeapSize
RtlUnwind
Sleep
HeapFree
IsValidCodePage
GetOEMCP
GetCPInfo
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
GetCurrentProcess
LCMapStringW
lstrcmpA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
IsProcessorFeaturePresent
EndPaint
ScreenToClient
GetWindowRect
SubtractRect
CharUpperA
GetClientRect
SetRectEmpty
BeginPaint
InflateRect
ChildWindowFromPoint
GetWindowPlacement
OffsetRect
GetWindowTextA
SetRect
IntersectRect
GetInputState
CreateWindowExA
DefWindowProcA
EqualRect
CopyRect
RegisterClassA
SetMapMode
GetDCOrgEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ