Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe
Resource
win10v2004-20220812-en
Target
windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe
Size
42.2MB
MD5
e4b46649d3a062a562e5c8ce5729bdd7
SHA1
b56cfec6692828d2b240b0978e09fa22ddf23994
SHA256
bc1462975dc1047acace72d40dc87b3baca7c2a3bf71d5f54ecaafb1bf924161
SHA512
ffd062af7bab46dcee293f1fe20bff9d677f9593595e34a3e3cf5b2b79bef0283b775adea7fbddefdb020a73e68b7a143df871328231af0600fe0bc1bde6d68c
SSDEEP
786432:IMXrrRLIxJpnkivyTFHltPOTT2WFbK3xXTHqFnnOOFd:IgXIpkPHltPOTTNUxXuFnf
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
TraceMessage
RegCreateKeyExW
RegCloseKey
EventWriteTransfer
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
GetLengthSid
AllocateAndInitializeSid
CopySid
FreeSid
CheckTokenMembership
EventUnregister
EventRegister
RegQueryValueExW
GetModuleFileNameW
GetExitCodeProcess
CreateProcessW
FreeLibrary
GetProcAddress
QueryFullProcessImageNameW
FindResourceW
LoadResource
CloseHandle
Process32FirstW
LockResource
Process32NextW
GetLastError
Sleep
CreateToolhelp32Snapshot
SetLastError
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetCurrentThreadId
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WriteFile
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapAlloc
GetStdHandle
SetFileAttributesW
GetStartupInfoW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
LoadLibraryExW
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
MultiByteToWideChar
ExitProcess
GetModuleHandleW
GetModuleHandleExW
GetProcessHeap
SetStdHandle
FlushFileBuffers
WideCharToMultiByte
ReadFile
ReadConsoleW
CreateFileW
WriteConsoleW
SetEndOfFile
HeapSize
HeapReAlloc
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
EncodePointer
InitializeCriticalSectionEx
GlobalMemoryStatusEx
FindNextFileW
FindClose
GetFileAttributesW
OpenProcess
CreateEventW
GetTempPathW
GetSystemDirectoryW
HeapSetInformation
VirtualLock
WaitForSingleObject
TerminateProcess
DeviceIoControl
GetVolumeInformationW
SizeofResource
GetNativeSystemInfo
GetFileType
FindFirstFileExW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
DecodePointer
UuidCreate
NtSetInformationFile
RtlNtStatusToDosError
RtlGetVersion
RtlUnwindEx
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlPcToFileHeader
WTHelperProvDataFromStateData
WinVerifyTrust
WTHelperGetProvSignerFromChain
CertVerifyCertificateChainPolicy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ