Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
tcmd1052x32_64.exe
Size
8.8MB
MD5
15efb954beb68ed3ef3af226011920af
SHA1
e7689327feeee7afa6685e5489257feeca3abc07
SHA256
b7a1454c9abcedf11a7581902557565bb0140245913382f18d6372e562590663
SHA512
39b1791750213e908f682d7ed05ce9a7f71e02f16ecbf86c904b9df3728d7307878704ff2eab7111c1bfbeff8c5d8da7c2976e5370c18f4e349b48b64af55924
SSDEEP
196608:4iTXRU2EhkbyqQh+cMgE5sUqfKqyUQDusDShb+ls9jcSDUb:4ibvEybyj0cMgA6KJUgusDeb+lCcSU
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileSize
IsValidCodePage
SetLastError
SetNamedPipeHandleState
GetCurrentProcessId
WideCharToMultiByte
TransactNamedPipe
LocalAlloc
CreateNamedPipeW
DisconnectNamedPipe
WaitNamedPipeA
DuplicateHandle
RemoveDirectoryW
CopyFileW
ConnectNamedPipe
CreateThread
GetWindowsDirectoryW
LoadLibraryExW
GetSystemDirectoryW
LoadLibraryExA
FindNextFileW
SetEnvironmentVariableA
GetOEMCP
GetACP
GetSystemDirectoryA
CompareStringA
GetCPInfo
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetStartupInfoA
TerminateProcess
ExitProcess
HeapAlloc
HeapFree
RtlUnwind
FindFirstFileW
GetDriveTypeA
GetVersionExA
SetErrorMode
GetCommandLineA
GetCommandLineW
GetModuleFileNameW
GetModuleFileNameA
GlobalAlloc
LoadLibraryA
GlobalFree
LocalFree
GetUserDefaultLCID
WinExec
CopyFileA
GetPrivateProfileStringA
GetWindowsDirectoryA
GetEnvironmentVariableW
GetEnvironmentVariableA
DosDateTimeToFileTime
LocalFileTimeToFileTime
CreateFileA
CreateFileW
SetFilePointer
ReadFile
WriteFile
DeleteFileA
SetFileTime
WritePrivateProfileStringA
CreateDirectoryW
CreateDirectoryA
GetTickCount
Sleep
GetCurrentProcess
OpenProcess
GetModuleHandleA
CloseHandle
GetProcAddress
GetLastError
FindFirstFileA
FindNextFileA
FindClose
MultiByteToWideChar
GetFileAttributesA
CompareStringW
SetFileAttributesA
OemToCharA
CharPrevW
LoadIconA
RegisterClassA
CreateWindowExA
GetMessageA
FindWindowA
GetUserObjectSecurity
CharLowerA
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
GetSystemMetrics
DrawTextW
BringWindowToTop
SetForegroundWindow
LoadCursorA
IsWindowUnicode
CharPrevA
MessageBoxA
UpdateWindow
CharUpperA
PostMessageA
MessageBoxW
EnumWindows
GetClassNameA
GetWindowTextA
GetClassLongA
GetDlgItemTextW
EnableWindow
CheckRadioButton
GetKeyState
IsDlgButtonChecked
CheckDlgButton
SetFocus
DialogBoxParamW
SetCursor
DialogBoxParamA
MessageBeep
SendDlgItemMessageW
EndDialog
SendMessageW
SendMessageA
GetDlgItemTextA
DestroyWindow
CreateDialogParamW
CreateDialogParamA
GetDlgItem
ShowWindow
GetSystemMenu
DeleteMenu
IsIconic
GetDC
GetClientRect
FillRect
wsprintfA
GetSysColor
DrawTextA
ReleaseDC
SendDlgItemMessageA
SetWindowTextA
SetDlgItemTextW
SetDlgItemTextA
GetWindowRect
GetParent
MoveWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetWindowThreadProcessId
CreateFontA
SelectObject
GetStockObject
DeleteObject
IntersectClipRect
SetTextColor
SetBkMode
CreateSolidBrush
SetBkColor
RegCreateKeyExA
AddAccessAllowedAce
RegCreateKeyExW
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
GetLengthSid
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
LookupAccountNameW
RegSetValueExA
RegDeleteKeyA
RegOpenKeyA
GetSecurityDescriptorOwner
RegCreateKeyA
FreeSid
LookupAccountSidW
EqualSid
GetAce
AllocateAndInitializeSid
DeleteAce
LookupAccountSidA
GetTokenInformation
GetUserNameW
InitializeAcl
ShellExecuteW
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ