Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
4e363da4b64303394b6980de48849bc3e7010cbe0b3015eb2f95e9737676186f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4e363da4b64303394b6980de48849bc3e7010cbe0b3015eb2f95e9737676186f.exe
Resource
win10v2004-20220901-en
Target
4e363da4b64303394b6980de48849bc3e7010cbe0b3015eb2f95e9737676186f
Size
104KB
MD5
4b3339c4fddb9fbbef399fc19659666c
SHA1
5313e44dcbef2f8913042c37573a7ad77a9f4e71
SHA256
4e363da4b64303394b6980de48849bc3e7010cbe0b3015eb2f95e9737676186f
SHA512
c1a16398c048b9c02fcfd906aba16b2a5da49c5df1ef16ad9009e125b46dada4a2d1002e70415ea94e6b100877e0bb212515eafa86d2268f6b8edd33c8ff1446
SSDEEP
1536:a9XM2K4Y3kK5MNq5cktsVPkRcT5nEYJyuXtg/I/rSLfrsSKPHRPmKJjrz3nYxx:a98xkK5h5xwPDTZrJ/rqzsFjrz3nYxx
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GlobalFree
GlobalGetAtomNameW
GlobalLock
GlobalSize
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByte
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
LocalLock
LocalUnlock
MapViewOfFile
MoveFileExW
MultiByteToWideChar
OpenProcess
OutputDebugStringW
QueryDosDeviceW
RaiseException
ReleaseMutex
ResetEvent
GlobalDeleteAtom
RtlUnwind
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetLastError
SetThreadExecutionState
SetThreadLocale
SignalObjectAndWait
Sleep
SystemTimeToFileTime
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
VirtualQueryEx
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
lstrcmpW
lstrcpyA
lstrcpyW
lstrcpynW
lstrlenA
lstrlenW
VirtualAllocEx
GlobalAlloc
GlobalAddAtomW
GetWindowsDirectoryW
GetWindowsDirectoryA
GetVersionExW
GetVersionExA
GetVersion
GetThreadLocale
GetTempPathW
GetSystemTime
GetSystemInfo
GetSystemDirectoryW
GetStdHandle
GetStartupInfoW
GetStartupInfoA
GetProcessTimes
GetProcessHeap
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetPriorityClass
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLongPathNameW
GetLogicalDriveStringsW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileAttributesW
GetExitCodeThread
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
GetCommandLineW
GetCPInfo
GetACP
FreeLibrary
FormatMessageW
FormatMessageA
FindFirstFileW
FindClose
FileTimeToSystemTime
ExitThread
ExitProcess
EnumCalendarInfoA
EnterCriticalSection
DeleteFileW
DeleteFileA
DeleteCriticalSection
DefineDosDeviceW
CreateThread
CreateProcessW
CreateMutexW
CreateMutexA
CreateFileW
CreateFileMappingW
CreateFileA
CreateEventW
CreateEventA
CompareStringW
ResumeThread
CloseHandle
UnregisterClassW
UpdateWindow
ValidateRect
ValidateRgn
GetCaretBlinkTime
IsWindowUnicode
IsWindowVisible
GetQueueStatus
DestroyMenu
VkKeyScanW
CopyIcon
CreatePopupMenu
IsCharAlphaW
CountClipboardFormats
IsWindowEnabled
GetMenuCheckMarkDimensions
GetOpenClipboardWindow
GetParent
GetFocus
TranslateMessage
TranslateAcceleratorA
TileChildWindows
TabbedTextOutA
ShowWindow
SetSystemCursor
SetMenuItemInfoW
SetDlgItemTextA
SetClassWord
SetClassLongW
SendMessageTimeoutW
RemovePropW
RegisterClassW
PtInRect
PostThreadMessageW
PostMessageW
PeekMessageW
OemToCharA
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjects
MessageBoxW
MessageBoxA
LockWorkStation
LoadStringW
LoadMenuW
LoadIconW
LoadCursorW
IsWindow
IsCharUpperW
InternalGetWindowText
GetSystemMetrics
GetSystemMenu
GetNextDlgTabItem
GetMessageW
GetKeyboardType
GetKeyboardLayoutNameW
GetCursorPos
GetClassLongA
ExitWindowsEx
EnumPropsW
EnumPropsExA
EnumDesktopsW
EnumDesktopsA
EndMenu
EnableMenuItem
EmptyClipboard
DrawTextExW
DrawStateW
DrawIconEx
DispatchMessageW
DestroyWindow
DeleteMenu
DefWindowProcW
DefFrameProcA
DefDlgProcA
DdeFreeStringHandle
DdeCmpStringHandles
CreateWindowStationA
CreateWindowExW
CreateDialogIndirectParamA
CharUpperBuffW
CharToOemW
CharToOemBuffA
CharToOemA
CharNextW
CharLowerBuffA
CharLowerA
ChangeMenuW
DdeQueryStringA
AddFontResourceA
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
CreateEllipticRgn
CreateEnhMetaFileA
CreateFontIndirectA
CreateFontIndirectExW
CreateFontW
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
Ellipse
EndPath
EngBitBlt
EngFindResource
EngMultiByteToWideChar
EngQueryLocalTime
ExtCreatePen
FillRgn
GdiAlphaBlend
GdiEntry8
GdiGetPageCount
GetDIBits
GetDeviceCaps
GetObjectW
GetPaletteEntries
GetPixel
GetStockObject
GetTextExtentPoint32W
GetTextFaceW
GetTextMetricsW
GetWinMetaFileBits
LineTo
MoveToEx
PolyDraw
PolylineTo
Rectangle
RoundRect
STROBJ_bEnumPositionsOnly
SelectObject
SetBkColor
SetBkMode
SetBoundsRect
SetPixel
SetTextColor
SetViewportOrgEx
StartDocW
StartFormPage
StretchBlt
StrokeAndFillPath
BeginPath
StrokePath
PathToRegion
GetTextCharacterExtra
GetPolyFillMode
GetDCBrushColor
CreateHalftonePalette
DeleteMetaFile
GetLayout
EndPage
FillPath
CreateMetaFileW
AngleArc
CloseFigure
DragFinish
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ