Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
idea64.exe
Size
928KB
MD5
e8419dd2d141b87e0915a456adafe011
SHA1
8210f14ee25b5a9b985285a5d0fec4910d59baab
SHA256
a397a5084b9b3d88ac20b9f37a6680c356a32f142b52a5bb032b854ad5cd6ca4
SHA512
3f7278fbe8d4a528c29013af76c2b0aa2d874ad428042ecfc5460cf06d69eeb2cc12d622d940a1e7ebe55de4f9bc6f83f32176366b57df79decf6a5ad1c79789
SSDEEP
12288:05O7plWDXjIRxuS60jYx/lj5w1322kvJcrEXlfLonhLgQLZz:05GpcvIRxr60jYdS329vJqg94hLgIz
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RevertToSelf
RegDisablePredefinedCache
RegOpenKeyExW
RegCloseKey
IsValidSid
GetLengthSid
ConvertStringSidToSidW
ConvertSidToStringSidW
EqualSid
CreateProcessAsUserW
SetThreadToken
GetTokenInformation
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
LookupPrivilegeValueW
CreateRestrictedToken
AdjustTokenPrivileges
FreeSid
ImpersonateLoggedOnUser
GetAce
RegCreateKeyExW
RegQueryValueExW
SystemFunction036
IsValidSecurityDescriptor
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
GetNamedSecurityInfoW
GetSecurityInfo
SetSecurityInfo
MapGenericMask
AccessCheck
IsValidAcl
InitializeAcl
AddMandatoryAce
BuildTrusteeWithSidW
SetEntriesInAclW
SymGetLineFromAddr64
SymFromAddr
SymCleanup
SymSetOptions
SymGetSearchPathW
SymSetSearchPathW
SymInitialize
RtlVirtualUnwind
RtlUnwindEx
RtlCaptureStackBackTrace
RtlInitUnicodeString
VerSetConditionMask
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlCaptureContext
RtlUnwind
CommandLineToArgvW
SHGetKnownFolderPath
CreateAppContainerProfile
DeriveAppContainerSidFromAppContainerName
GetAppContainerRegistryLocation
GetAppContainerFolderPath
timeGetTime
GetProcessHeap
GetOEMCP
IsValidCodePage
HeapSize
ReadConsoleW
HeapReAlloc
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
HeapFree
HeapAlloc
GetACP
GetStdHandle
SetStdHandle
ExitProcess
GetConsoleMode
GetConsoleCP
GetCommandLineA
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetStringTypeW
LCMapStringEx
DecodePointer
EncodePointer
DeleteCriticalSection
GetModuleFileNameA
GetCommandLineW
ExpandEnvironmentStringsW
GetModuleFileNameW
SetEnvironmentVariableW
ExpandEnvironmentStringsA
GetEnvironmentVariableW
GetEnvironmentVariableA
WaitForSingleObject
UnmapViewOfFile
SetCurrentDirectoryA
GetLastError
GetFileAttributesA
SetEvent
LoadLibraryA
CloseHandle
CreateThread
GetCurrentDirectoryW
GetProcAddress
CreateFileMappingA
GetCurrentProcessId
FreeLibrary
WideCharToMultiByte
OpenFileMappingA
VerifyVersionInfoW
CreateEventA
MapViewOfFile
SetDllDirectoryW
CreateIoCompletionPort
CreateEventW
SetLastError
ResetEvent
GetQueuedCompletionStatus
RegisterWaitForSingleObject
UnregisterWait
TerminateJobObject
PostQueuedCompletionStatus
GetModuleHandleExW
SetInformationJobObject
GetCurrentProcess
DuplicateHandle
GetCurrentThreadId
TerminateProcess
GetUserDefaultLangID
GetUserDefaultLCID
GetUserDefaultLocaleName
EnumSystemLocalesEx
HeapDestroy
GetTickCount
CreateFileW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
UnregisterWaitEx
GetCurrentThread
Sleep
IsDebuggerPresent
RaiseException
GetModuleHandleW
GetThreadId
GetFileType
SetHandleInformation
SetDefaultDllDirectories
HeapSetInformation
SetThreadInformation
GetProcessMitigationPolicy
SetProcessMitigationPolicy
GetVersionExW
GetProductInfo
GetNativeSystemInfo
IsWow64Process
LocalFree
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteProcessMemory
CreateFileMappingW
ReadProcessMemory
GetCurrentProcessorNumber
SetThreadAffinityMask
VirtualFree
GetProcessHeaps
LoadLibraryExW
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
CreateNamedPipeW
CreateJobObjectW
QueryInformationJobObject
VirtualAllocEx
VirtualProtectEx
GetModuleHandleA
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateMutexW
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
VirtualFreeEx
GetProcessHandleCount
SetUnhandledExceptionFilter
TlsGetValue
DebugBreak
TlsAlloc
TlsFree
TlsSetValue
SetFilePointerEx
ReadFile
SetEndOfFile
FlushFileBuffers
CreateRemoteThread
MultiByteToWideChar
FindClose
FindNextFileW
FindFirstFileExW
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
GetProcessWindowStation
GetThreadDesktop
CloseWindowStation
CloseDesktop
LoadStringW
MessageBoxA
AllowSetForegroundWindow
MessageBoxW
GetUserObjectInformationW
LoadStringA
CoTaskMemFree
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ