Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
addnhost64.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
addnhost64.exe
Resource
win10v2004-20230915-en
Target
addnhost64.exe
Size
1.0MB
MD5
1e6455c963f04780d502061320f35152
SHA1
f88d4247f341fbcf8009b4a255db5489aa8dc1ac
SHA256
85279b76c68581d98070588454afd07c5eec6fc56739aec30e39055ef2f3e605
SHA512
65e565b8cb32418f03bf8a15879b558a3d10ef41d105ba4a5ca9214c7514aa02993e24616eb84011c7c7a633103f630102475a6c0f14f2cb1ee6d389701c8012
SSDEEP
24576:SgplZYgGBiw/bFoAs9zznE2LOZa3+gQrzSlwbnqk:SgplCgIiw/bq1o/ZaGmlwbnz
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetModuleFileNameExW
CoCreateInstance
CoInitialize
CoFreeLibrary
CoLoadLibrary
CLSIDFromProgID
CoFreeUnusedLibraries
SetEnvironmentVariableA
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
LoadLibraryW
DecodePointer
GetProcAddress
DeleteCriticalSection
FreeLibrary
LoadLibraryA
GetCurrentProcessId
HeapFree
HeapSize
MultiByteToWideChar
HeapReAlloc
HeapAlloc
GetProcessHeap
ReadFile
GetConsoleOutputCP
WriteFile
CreateFileW
GetCurrentThreadId
FormatMessageW
CloseHandle
LocalFree
GetModuleHandleW
WideCharToMultiByte
CreateDirectoryW
TerminateProcess
OpenProcess
Sleep
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
GetThreadTimes
FileTimeToSystemTime
GetEnvironmentStringsW
FindNextFileA
FindFirstFileExA
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
SetStdHandle
GetOEMCP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetCommandLineA
GetStdHandle
WriteConsoleW
SetEndOfFile
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
QueryPerformanceCounter
GetCurrentDirectoryW
FindClose
GetFullPathNameW
RtlUnwind
AreFileApisANSI
SetLastError
CreateEventW
TlsFree
GetSystemTimeAsFileTime
GetTickCount
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SetEvent
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwindEx
RtlPcToFileHeader
GetACP
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
ExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
LoadStringW
SafeArrayDestroy
SafeArrayGetUBound
SysAllocString
VariantCopy
SafeArrayCreate
SafeArrayCreateVector
VariantChangeType
SystemTimeToVariantTime
VariantInit
SafeArrayGetElement
SafeArrayPutElement
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
SysFreeString
VariantClear
ale_get_unique_instance_map
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ