Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a8e667c99d678dcd83e16d5da8af98bd4fa7d89f2ce86807d2475c6ddd2f5079.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a8e667c99d678dcd83e16d5da8af98bd4fa7d89f2ce86807d2475c6ddd2f5079.exe
Resource
win10v2004-20230915-en
Target
a8e667c99d678dcd83e16d5da8af98bd4fa7d89f2ce86807d2475c6ddd2f5079
Size
4.8MB
MD5
e93261374ecf495cfab5626528a6ef7e
SHA1
3dd56b15091e2e9199b878ab4a17c1359e02d98b
SHA256
a8e667c99d678dcd83e16d5da8af98bd4fa7d89f2ce86807d2475c6ddd2f5079
SHA512
0bbc3df85c464ebcb8944b9d0234d727cf864ea6908ebbb0220c37cdbdceaac2ecde5d929799225f50892671c3e83499792b4b032b572336e65d0a28bdf24134
SSDEEP
49152:zauU3MuTDzoNPSTaQNVQrxKAHVsrWkWDMNTWGn88bPO:F4ANPKQrZs7SMNTWGn88zO
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Process32Next
CloseHandle
HeapAlloc
Beep
ExitProcess
GetComputerNameW
GetProcessHeap
lstrcmpiA
CreateProcessA
CreateFileA
GetLastError
GetTickCount64
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
InitializeCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetThreadExecutionState
Sleep
VerSetConditionMask
FreeLibrary
GetModuleHandleExW
GetProcAddress
LoadLibraryA
FormatMessageW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetModuleFileNameW
GetStdHandle
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
SetStdHandle
GetConsoleOutputCP
GetConsoleMode
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
CreateFileW
HeapSize
WriteConsoleW
SetEndOfFile
CreateToolhelp32Snapshot
SetCurrentDirectoryA
GetEnvironmentVariableA
CreateMutexW
WriteFile
HeapFree
Process32First
QueryPerformanceFrequency
RtlUnwind
SetWindowPos
GetWindowPlacement
SetWindowPlacement
BringWindowToTop
SetFocus
GetKeyState
MapVirtualKeyW
SetCapture
ReleaseCapture
SetForegroundWindow
GetDC
ReleaseDC
SetPropW
GetPropW
RemovePropW
GetClientRect
AdjustWindowRectEx
SetCursorPos
SetCursor
GetCursorPos
ClientToScreen
ScreenToClient
WindowFromPoint
SetRect
OffsetRect
PtInRect
GetWindowLongW
SetWindowLongW
LoadCursorW
DestroyIcon
LoadImageW
SystemParametersInfoW
MonitorFromWindow
GetMonitorInfoW
GetRawInputData
RegisterRawInputDevices
GetRawInputDeviceInfoA
GetRawInputDeviceList
ChangeDisplaySettingsExW
EnumDisplaySettingsW
EnumDisplayDevicesW
EnumDisplayMonitors
RegisterDeviceNotificationW
UnregisterDeviceNotification
ToUnicode
RegisterClassExW
UnregisterClassW
DefWindowProcW
GetMessageTime
PeekMessageW
DispatchMessageW
TranslateMessage
TrackMouseEvent
MessageBoxA
ShowWindow
DestroyWindow
ClipCursor
CreateWindowExW
DeleteObject
CreateDCW
DeleteDC
GetDeviceCaps
SetDeviceGammaRamp
ChoosePixelFormat
DescribePixelFormat
CreateRectRgn
SetPixelFormat
SwapBuffers
DragQueryFileW
DragQueryPoint
DragFinish
DragAcceptFiles
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ