Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
837b994c1c16a3a7b71a4641bae8531f3f145893d63434842af05d226e8aa1db.exe
Resource
win7-20220812-en
Target
837b994c1c16a3a7b71a4641bae8531f3f145893d63434842af05d226e8aa1db
Size
172KB
MD5
0c79e2047f2afd97b4fad12ce1127847
SHA1
88b1aa9a3abacfbca2c18956c5aff88efe05c23c
SHA256
837b994c1c16a3a7b71a4641bae8531f3f145893d63434842af05d226e8aa1db
SHA512
9bb23413088ccb77830628011dcc665be8bfb17e20d81f9ad2451f8c63b02d1485d15c09532891d0dad7d551215f4d7f8ac2130c1ab9d09b2c1bd716c76dd613
SSDEEP
3072:u2nTLLEpyrQqMEh7fnt8V7TDv98FT7QFhfxbXxgCzXtQk:u2nTLUyrQBENt8VfZ8FTYXxZz6k
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAllocEx
GetModuleHandleW
CreateProcessW
OpenMutexW
GetFileAttributesW
CreateDirectoryW
CreateFileW
WaitNamedPipeW
WriteFile
GlobalAddAtomW
GlobalGetAtomNameW
GlobalDeleteAtom
GetUserDefaultUILanguage
FindFirstFileW
FindClose
FindNextFileW
CreateFileMappingW
GetFileSizeEx
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
GetNativeSystemInfo
FindCloseChangeNotification
FindNextChangeNotification
OutputDebugStringW
SetLastError
ReleaseMutex
CreateMutexW
ProcessIdToSessionId
SetEnvironmentVariableA
ReadConsoleW
ReadFile
SetEndOfFile
SetStdHandle
SetFilePointerEx
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleMode
GetConsoleCP
LocalFree
GetTimeZoneInformation
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
UnhandledExceptionFilter
RtlCaptureContext
HeapReAlloc
HeapSize
ExitProcess
GetCommandLineW
ExitThread
GetSystemTimeAsFileTime
WriteConsoleW
GetModuleHandleExW
GetFileType
GetStdHandle
IsProcessorFeaturePresent
IsDebuggerPresent
LCMapStringW
EncodePointer
DecodePointer
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
GetModuleFileNameA
CreateProcessA
SetUnhandledExceptionFilter
InitializeCriticalSection
SetCriticalSectionSpinCount
LocalAlloc
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
WaitForMultipleObjects
SetThreadPriority
CreateThread
CreateEventW
GetCurrentProcessId
VirtualFree
VirtualAlloc
lstrcmpW
DeleteCriticalSection
WaitForSingleObject
GetCurrentThread
SystemTimeToFileTime
GetDateFormatW
GetTimeFormatW
OpenProcess
Sleep
FreeLibrary
LoadLibraryW
GetTickCount
CloseHandle
ResetEvent
SetEvent
OpenEventW
WTSGetActiveConsoleSessionId
GetModuleFileNameW
GetLastError
GetVersionExW
GetWindowsDirectoryW
lstrcpyW
lstrcatW
lstrcpynW
ExpandEnvironmentStringsW
CompareStringW
lstrcmpiW
GetProcAddress
RaiseException
lstrlenW
MulDiv
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetStartupInfoA
GetModuleHandleA
GetDesktopWindow
GetClipboardOwner
GetThreadDesktop
GetCaretBlinkTime
DestroyWindow
GetKeyState
IsIconic
GetTopWindow
GetSysColor
GetListBoxInfo
IsWindowVisible
GetTextAlign
GetDCPenColor
CloseMetaFile
CreateMetaFileA
FillPath
GetFontLanguageInfo
GetSystemPaletteUse
GetLayout
RegOpenKeyA
RegQueryValueExA
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_controlfp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ