Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
d788e2d973d56992a3b97d8a1ba9aa005d3a11a71194a521537a510636ba55c0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d788e2d973d56992a3b97d8a1ba9aa005d3a11a71194a521537a510636ba55c0.exe
Resource
win10v2004-20230915-en
Target
d788e2d973d56992a3b97d8a1ba9aa005d3a11a71194a521537a510636ba55c0
Size
3.0MB
MD5
50d1482e3e929cff2a3d140af72fd4d7
SHA1
f8064ff2a3f46b2cca1b16b3c3ddadae54a5d51d
SHA256
d788e2d973d56992a3b97d8a1ba9aa005d3a11a71194a521537a510636ba55c0
SHA512
343a53e12a3d512eeb5f43a6d6640aa4addc1bd2d30e6677b215407c38634f14f9784c2121bf8dfa3c19555700370cc3acc23eba8000b3736b072d2a2c7418a2
SSDEEP
49152:nTIBTN7cVRVLItZnNs4T3Bet25zzry2uECwx:swzVLi1x1zHNCwx
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
LockResource
Process32Next
CloseHandle
LoadResource
HeapAlloc
Beep
GetComputerNameW
GetProcessHeap
lstrcmpiA
CreateProcessA
CreateFileA
GetLastError
GetTickCount64
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetThreadExecutionState
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceFrequency
VerSetConditionMask
FreeLibrary
GetModuleHandleExW
GetProcAddress
LoadLibraryA
FormatMessageW
CreateToolhelp32Snapshot
SetLastError
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
GetStdHandle
GetModuleFileNameW
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
CreateFileW
SetFilePointerEx
HeapSize
ReadFile
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetCurrentDirectoryA
FreeResource
FindResourceA
CreateMutexW
WriteFile
HeapFree
Process32First
SizeofResource
ExitProcess
RtlUnwindEx
Sleep
SetWindowPos
GetWindowPlacement
SetWindowPlacement
BringWindowToTop
SetFocus
GetKeyState
MapVirtualKeyW
SetCapture
ReleaseCapture
SetForegroundWindow
GetDC
ReleaseDC
SetPropW
GetPropW
RemovePropW
GetClientRect
AdjustWindowRectEx
SetCursorPos
SetCursor
GetCursorPos
ClientToScreen
ScreenToClient
WindowFromPoint
SetRect
OffsetRect
PtInRect
GetWindowLongW
SetWindowLongW
LoadCursorW
DestroyIcon
LoadImageW
SystemParametersInfoW
MonitorFromWindow
GetMonitorInfoW
GetRawInputData
RegisterRawInputDevices
GetRawInputDeviceInfoA
GetRawInputDeviceList
ChangeDisplaySettingsExW
EnumDisplaySettingsW
EnumDisplayDevicesW
EnumDisplayMonitors
RegisterDeviceNotificationW
UnregisterDeviceNotification
ToUnicode
RegisterClassExW
UnregisterClassW
DefWindowProcW
GetMessageTime
PeekMessageW
DispatchMessageW
TranslateMessage
TrackMouseEvent
MessageBoxA
ShowWindow
DestroyWindow
ClipCursor
CreateWindowExW
DeleteObject
CreateDCW
DeleteDC
GetDeviceCaps
SetDeviceGammaRamp
ChoosePixelFormat
DescribePixelFormat
CreateRectRgn
SetPixelFormat
SwapBuffers
DragQueryFileW
DragQueryPoint
DragFinish
DragAcceptFiles
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ