Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
a559bae19314dd71047b3a51bd289e7d397380d7a0bb8f7acd6cf765d5ecfed5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a559bae19314dd71047b3a51bd289e7d397380d7a0bb8f7acd6cf765d5ecfed5.exe
Resource
win10v2004-20220901-en
Target
a559bae19314dd71047b3a51bd289e7d397380d7a0bb8f7acd6cf765d5ecfed5
Size
551KB
MD5
82ac89faee812370340f8d16dac9905a
SHA1
5da4d084b442a2b51c4977e2f529c15f83c48933
SHA256
a559bae19314dd71047b3a51bd289e7d397380d7a0bb8f7acd6cf765d5ecfed5
SHA512
ae87b111fea10887473e7aac1fa749c93104971c718c3760ca1f07bdac51395560a4bba058bf1dc8ac84b886db735073167e6887215871af0ef27bccaa63fa28
SSDEEP
6144:Dl6qPDhO4c8hfjcTvAPHM5pKvwHOYPm3lBh+PnxPwFFtxUEH3LDqdk:vlO4c8VjXsowHOYPm3bhwnxqUubT
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VerifyVersionInfoW
WTSGetActiveConsoleSessionId
FreeLibrary
GetTickCount64
ProcessIdToSessionId
RtlUnwind
RtlCaptureStackBackTrace
SetEndOfFile
WriteConsoleW
HeapReAlloc
HeapSize
ReadConsoleW
ResumeThread
SetFilePointerEx
LoadLibraryW
SetConsoleCtrlHandler
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
GetProcAddress
GetFileSizeEx
GetModuleHandleW
GetCurrentThreadId
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
GetLastError
CloseHandle
ReadFile
VerSetConditionMask
FindFirstFileExW
OutputDebugStringW
WideCharToMultiByte
MultiByteToWideChar
GetConsoleMode
GetConsoleOutputCP
FindClose
FindFirstFileA
FindNextFileA
GetLocalTime
FatalExit
RtlCaptureContext
CreateDirectoryW
CreateFileW
DeleteFileW
GetTempPathW
RaiseException
MoveFileW
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
EncodePointer
RtlPcToFileHeader
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetFileType
HeapFree
HeapAlloc
GetCurrentThread
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
OpenInputDesktop
CloseDesktop
GetMessageW
SetThreadDesktop
UnhookWinEvent
SetWinEventHook
EnumDisplayDevicesW
LoadCursorW
SetRect
AdjustWindowRectEx
GetClientRect
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
UnregisterClassW
PostQuitMessage
DefWindowProcW
UnregisterPowerSettingNotification
RegisterPowerSettingNotification
DispatchMessageW
TranslateMessage
EnumDisplayMonitors
RegisterWindowMessageW
GetUserObjectInformationA
GetSystemMetrics
EnumDisplaySettingsW
GetMonitorInfoW
GetThreadDesktop
CreateDCW
DeleteDC
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerExA
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
SHGetFolderPathW
DwmIsCompositionEnabled
WTSRegisterSessionNotification
SymFunctionTableAccess64
MiniDumpWriteDump
SymSetSearchPath
SymGetSearchPath
StackWalk64
SymSetOptions
SymCleanup
SymFromAddr
SymGetModuleBase64
SymGetLineFromAddr64
SymInitialize
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ