Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
b8de4936e83b09c514eda3f52a9c737397d15238588c95f614a61f5b2a99cd1f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b8de4936e83b09c514eda3f52a9c737397d15238588c95f614a61f5b2a99cd1f.exe
Resource
win10v2004-20220812-en
Target
b8de4936e83b09c514eda3f52a9c737397d15238588c95f614a61f5b2a99cd1f
Size
189KB
MD5
65dccbd0361399de1fd8a542e9ca84ad
SHA1
bbebec5547e85bfb7c13b7628036b1cfc0ebc6d7
SHA256
b8de4936e83b09c514eda3f52a9c737397d15238588c95f614a61f5b2a99cd1f
SHA512
bb9b715966223edbf019fb54a02e91d816eb1905c1b1159f56e46b4a07372937d8d11217f9b54e0bd542dec4ba370f10a9e9ae71aa3f58acfb9c2ce1d0da4a9a
SSDEEP
3072:J+SRZjsTGEAR4SBoK1h7kHLrUeCuSCqxUi53tzLFahQsVgGxw4E202ywk8fwpbEe:JZfcY4SQHLq7LUix/aW+dHzCf8IpbEH+
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetStringTypeA
GetVersion
EnumCalendarInfoW
OpenWaitableTimerA
IsBadStringPtrA
Sleep
GetMailslotInfo
GetVolumeInformationA
GlobalDeleteAtom
SetCurrentDirectoryW
lstrcpyW
OpenSemaphoreW
IsBadWritePtr
SetErrorMode
FileTimeToLocalFileTime
GetSystemDirectoryA
GetProcAddress
LocalAlloc
lstrcpyA
GlobalFindAtomA
GetCurrentThread
lstrcmpW
FindResourceW
lstrlen
GetUserDefaultLCID
GetTempFileNameA
GetUserDefaultLangID
GetStringTypeW
GetTempPathA
ExpandEnvironmentStringsA
SearchPathA
AddAtomW
OpenEventA
GetCurrentThreadId
SetDlgItemTextW
EmptyClipboard
CreateMenu
LoadCursorW
GetMenuState
UpdateLayeredWindow
GetCursorPos
CreateAcceleratorTableW
AppendMenuA
GetDlgItemTextA
EnumWindowStationsA
MessageBeep
RegisterClassA
GetClassInfoA
GetCapture
WinHelpA
LoadIconA
CreateDialogIndirectParamW
ShowWindow
DestroyCursor
GetClassInfoExA
ActivateKeyboardLayout
LoadImageA
AdjustWindowRect
GetClassInfoExW
SetCursor
GetMessageW
DefWindowProcA
UnregisterClassW
GetDlgItemTextW
LoadMenuIndirectA
GetMenuStringA
GetKeyState
MonitorFromPoint
UnregisterClassA
GetMenuItemCount
DialogBoxIndirectParamW
keybd_event
LoadBitmapA
GetIconInfo
wsprintfW
InvalidateRect
GetSysColorBrush
FindWindowW
DialogBoxParamW
RegisterClassW
SetWindowTextW
RemoveMenu
GetCapture
WinHelpW
GetForegroundWindow
SetActiveWindow
GetDlgItemInt
LoadIconW
RegisterClassExW
PostQuitMessage
MessageBoxA
GetClassInfoW
CreateWindowExW
CreateFontW
DeleteObject
RegRestoreKeyA
RegQueryMultipleValuesW
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyExA
RegFlushKey
RegQueryInfoKeyW
RegQueryValueA
RegReplaceKeyW
StrCmpNIA
SHGetDiskFreeSpaceExW
SHGetDataFromIDListW
SHGetDesktopFolder
SHBrowseForFolder
InitCommonControls
PrintDlgExA
ReplaceTextA
ChooseFontA
ReplaceTextW
FindTextA
PageSetupDlgA
RegisterMediaTypeClass
RegisterBindStatusCallback
FindMediaTypeClass
GetSoftwareUpdateInfo
CoInternetGetSecurityUrl
IsJITInProgress
CoInternetGetProtocolFlags
Extract
HlinkSimpleNavigateToString
URLOpenStreamW
URLOpenBlockingStreamA
_LoadImage_@24
_GetModuleHandle_@4
_LogonUser_@24
_SendMessage@16
_WaitNamedPipe_@8
_strerror_@4
_GetProfileSection_@12
_DispatchMessage_@4
WSAUnhookBlockingHook
AcceptEx
WSASetLastError
ntohl
EnumProtocolsW
GetTypeByNameA
GetAddressByNameW
GetNameByTypeA
__WSAFDIsSet
GetTypeByNameW
gethostbyname
SetServiceW
??_8istream@@7B@
?width@ios@@QAEHH@Z
?unlock@streambuf@@QAEXXZ
??_7stdiostream@@6B@
??4filebuf@@QAEAAV0@ABV0@@Z
??0istrstream@@QAE@ABV0@@Z
??5istream@@QAEAAV0@AAN@Z
??0ostream_withassign@@QAE@ABV0@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ