Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Target
accessdatabaseengine_X64.exe
Size
79.5MB
MD5
b6edbbe9b8435497e4c139164522fff0
SHA1
bd0bd0ddf153edaa33fd357749fe53e49f4d730e
SHA256
04e96c9f1a1f7d251a88aececf1dc10ff65950392787427c00814a43308003de
SHA512
264545f31a74e2e776ca9e9e3a8d066da20c1efc0e4a2bb70bc53ab52ca2b7aca9a88d5ef51143ca6ece5594d3e0b8ba689c4752681b29337f44439dffd9d743
SSDEEP
1572864:yHKqsv/iC2Q2UYBPVuI0650Jlo9OiwISj8RULIhmi:yA/3xPYFV5ilo9VjSAcI/
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CopyFileA
MoveFileA
MultiByteToWideChar
Sleep
CreateThread
CreateToolhelp32Snapshot
Process32First
Process32Next
ReadFile
ExpandEnvironmentStringsA
SetEvent
CreateEventA
SetFilePointer
CreateFileW
DeleteFileW
GetTempFileNameW
WriteFile
GetTempPathW
CreateProcessW
ExpandEnvironmentStringsW
GetSystemDirectoryA
LoadResource
LockResource
FindResourceA
GetSystemDefaultLangID
GetUserDefaultLangID
GlobalAlloc
GlobalFree
GetModuleHandleA
CompareStringA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetDiskFreeSpaceExA
SetLastError
GetCurrentProcess
CreateProcessA
GetWindowsDirectoryA
CreateFileMappingA
WritePrivateProfileStringA
SetFileTime
DosDateTimeToFileTime
VirtualQuery
VirtualProtect
GetSystemInfo
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
UnmapViewOfFile
MapViewOfFile
GetTempFileNameA
GetTempPathA
GetFullPathNameA
GetFileSize
DeleteFileA
CreateFileA
CreateDirectoryA
GetVersionExA
GetExitCodeProcess
WaitForSingleObject
CloseHandle
WideCharToMultiByte
LoadLibraryExA
GetProcAddress
GetModuleHandleW
FreeLibrary
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
RaiseException
GetConsoleCP
GetProcessHeap
SetStdHandle
GetModuleFileNameA
LocalFree
GetFileAttributesW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
EncodePointer
RtlUnwind
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetStdHandle
ExitProcess
GetACP
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
GetFileType
GetStringTypeW
GetFileAttributesExW
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
DecodePointer
VariantChangeType
VariantClear
VariantInit
SysFreeString
SysAllocString
FreeSid
LookupPrivilegeValueA
GetTokenInformation
EqualSid
AllocateAndInitializeSid
AdjustTokenPrivileges
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CLSIDFromProgID
CoInitialize
CoTaskMemFree
CoCreateInstance
CreateFontIndirectA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ