Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
JetBrains.dotPeek.2023.1.3.web.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
JetBrains.dotPeek.2023.1.3.web.exe
Resource
win10v2004-20230621-en
Target
JetBrains.dotPeek.2023.1.3.web.exe
Size
44.2MB
MD5
c2c9a84fea3a56888e3749c96ae147c3
SHA1
9cbe18daf9fc9a09db55da8be447186ca2490ffa
SHA256
e5ff3473f54fe4545a91d87f1d8b4cf2712354855a4602706fe08be3660ab4fa
SHA512
520454e3b37c74e1efadc8ce12e28e650df0c1bd87d3cc158333b6103f068968ce1d75c7b1c998dc82953d190c9cad03f00cedb9004240aea7981c7ae28bd6c9
SSDEEP
786432:IKCN0AVn2FyOnsc83XKoMaTAhlHd0x0qDePqjgt8/uQmnwhJ1S0hES:IKCN0M2FyGsc83X7MaTAzH+KwePkZ7Xz
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
CreateProcessW
CreateFileW
SetFilePointer
WriteFile
GetTempPathW
GetFileAttributesW
GetModuleFileNameW
GetCurrentDirectoryW
FindResourceW
LoadResource
LockResource
SizeofResource
LocalFree
VerifyVersionInfoW
VerSetConditionMask
FreeLibrary
SetErrorMode
FormatMessageW
WriteConsoleW
FlushConsoleInputBuffer
WaitForSingleObject
PeekConsoleInputW
ReadConsoleInputW
GetStdHandle
GetConsoleMode
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentThreadId
CreateThread
InitializeCriticalSectionAndSpinCount
TerminateProcess
DecodePointer
DeleteCriticalSection
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapSize
GetProcessHeap
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetModuleHandleExW
ExitProcess
HeapFree
HeapReAlloc
HeapAlloc
Module32NextW
Module32FirstW
CreateToolhelp32Snapshot
CloseHandle
SetSearchPathMode
SetDllDirectoryW
GetSystemDirectoryW
LoadLibraryW
LoadLibraryExW
GetProcAddress
GetModuleHandleW
CompareStringW
GetLastError
InterlockedIncrement
RaiseException
InterlockedDecrement
GetCommandLineW
GetCommandLineA
RtlUnwind
InitializeSListHead
GetCurrentProcessId
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
OutputDebugStringW
IsDebuggerPresent
GetCPInfo
GetLocaleInfoW
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
Sleep
SetLastError
EncodePointer
GetStringTypeW
WideCharToMultiByte
MultiByteToWideChar
MonitorFromPoint
GetMonitorInfoW
GetProcessWindowStation
GetSystemMetrics
PostThreadMessageW
MessageBoxW
TranslateMessage
DispatchMessageW
SetTimer
LoadCursorW
GetUserObjectInformationW
GetCursorInfo
GetMessageW
LoadIconW
DestroyWindow
GetGUIThreadInfo
KillTimer
DefWindowProcW
GetWindowLongW
SetWindowLongW
GetAncestor
IsWindowVisible
EnumThreadWindows
SetWindowPos
UpdateLayeredWindow
CreateWindowExW
RegisterClassExW
IsWindow
CreateCompatibleDC
DeleteObject
CreateDIBSection
DeleteDC
GetDeviceCaps
CreateDCW
SelectObject
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
ShellExecuteW
CoInitializeEx
CoCreateInstance
SysAllocString
SysFreeString
SysAllocStringByteLen
SysStringLen
VariantChangeType
VariantClear
VariantInit
SysStringByteLen
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopyInd
CreateErrorInfo
GetErrorInfo
SafeArrayRedim
SafeArrayUnlock
SafeArrayCopy
SafeArrayLock
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetVartype
SetErrorInfo
GdipCloneBrush
GdipCreateSolidFill
GdipCreateHatchBrush
GdipCreateFromHDC
GdipAlloc
GdiplusShutdown
GdipDeleteBrush
GdipFillRectangleI
GdipDeleteGraphics
GdipFree
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ