Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
28521e725baf65c445fde2a8f6017714ec75fac97c220b73603ceafb6b12db07.exe
Resource
win7-20230831-en
Target
28521e725baf65c445fde2a8f6017714ec75fac97c220b73603ceafb6b12db07
Size
5.5MB
MD5
d3dea311234ece6aca4d44e97263b25c
SHA1
d577a84221cfe7a23d626470c54937b1fa972593
SHA256
28521e725baf65c445fde2a8f6017714ec75fac97c220b73603ceafb6b12db07
SHA512
644b252043ebba8988f46e98d2bf42e822e0281c1983f31d7b77427c40c3423bc0746ae18dea5b73902baced12a7354b3d0057abca53bf09c7441e9e38c0f626
SSDEEP
49152:trdixnwsi1uzfDUb7YlQXdx2956TMUTEcDy6xjDpyrb/h0mXBhoW3TZS+5aQ3dwv:tvlOBa3I3rWqGitd3wC2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RegCloseKey
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
DuplicateTokenEx
OpenThreadToken
RevertToSelf
ImpersonateLoggedOnUser
CheckTokenMembership
EventWrite
EventRegister
EventEnabled
BCryptGenRandom
BCryptEncrypt
BCryptImportKey
BCryptOpenAlgorithmProvider
BCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptDestroyKey
BCryptDecrypt
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
RtlPcToFileHeader
ExitProcess
RaiseFailFastException
GetTickCount64
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetProcAddress
CloseThreadpoolIo
FindNLSStringEx
CompareStringEx
FindStringOrdinal
GetUserPreferredUILanguages
InitializeConditionVariable
WakeConditionVariable
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FileTimeToSystemTime
GetLastError
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetStdHandle
GetSystemTime
LocalAlloc
LocalFree
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
WideCharToMultiByte
Sleep
WaitForMultipleObjectsEx
WaitForSingleObject
GetCurrentThread
WaitForThreadpoolWaitCallbacks
CreateThreadpoolIo
StartThreadpoolIo
CancelThreadpoolIo
LocaleNameToLCID
LCMapStringEx
CompareStringOrdinal
GetLocaleInfoEx
EnumTimeFormatsEx
GetCalendarInfoEx
EnumCalendarInfoExEx
ResolveLocaleName
SleepConditionVariableCS
CopyFileExW
CreateFileW
DeleteFileW
DeviceIoControl
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FlushFileBuffers
FreeLibrary
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandleEx
GetFileType
GetFullPathNameW
GetLongPathNameW
GetModuleFileNameW
GetOverlappedResult
GetSystemDirectoryW
LoadLibraryExW
OutputDebugStringW
ReadFile
SetFileInformationByHandle
SetFilePointerEx
SetThreadErrorMode
GetDynamicTimeZoneInformation
GetTimeZoneInformation
WriteFile
GetCurrentProcessorNumberEx
CloseHandle
SetEvent
CreateEventExW
GetEnvironmentVariableW
FormatMessageW
CreateThread
ResumeThread
DuplicateHandle
GetThreadPriority
SetThreadPriority
GetConsoleCP
GetCPInfoExW
K32EnumProcessModulesEx
IsWow64Process
GetExitCodeProcess
CreateProcessW
TerminateProcess
OpenProcess
K32EnumProcesses
K32GetModuleInformation
K32GetModuleBaseNameW
K32GetModuleFileNameExW
GetProcessId
CreatePipe
CreateFileA
GetProcessHeap
HeapFree
HeapAlloc
LoadLibraryA
VirtualProtect
VirtualAllocEx
FlushProcessWriteBuffers
GetCurrentThreadId
WaitForSingleObjectEx
VirtualQuery
RtlRestoreContext
AddVectoredExceptionHandler
FlsAlloc
FlsGetValue
FlsSetValue
CreateEventW
SwitchToThread
SuspendThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualFree
QueryInformationJobObject
GetModuleHandleW
GetModuleHandleExW
GetProcessAffinityMask
InitializeContext
GetEnabledXStateFeatures
SetXStateFeaturesMask
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
ResetEvent
DebugBreak
SleepEx
GlobalMemoryStatusEx
GetSystemInfo
GetLogicalProcessorInformation
GetLogicalProcessorInformationEx
GetLargePageMinimum
VirtualUnlock
VirtualAllocExNuma
IsProcessInJob
GetNumaHighestNodeNumber
GetProcessGroupAffinity
K32GetProcessMemoryInfo
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoGetApartmentType
CoCreateGuid
CoWaitForMultipleHandles
CoInitializeEx
LoadStringW
cos
floor
pow
sin
__setusermatherr
ceil
sqrt
tan
modf
_callnewh
calloc
free
malloc
_set_new_mode
strcpy_s
strcmp
strncpy_s
wcsncmp
_wcsicmp
_stricmp
_get_initial_wide_environment
_initterm_e
_register_thread_local_exe_atexit_callback
_initterm
_exit
_c_exit
_cexit
__p___wargv
_initialize_wide_environment
__p___argc
terminate
_crt_atexit
_configure_wide_argv
_register_onexit_function
_initialize_onexit_table
abort
_set_app_type
_seh_filter_exe
exit
__stdio_common_vfprintf
__stdio_common_vsprintf_s
__stdio_common_vsscanf
__acrt_iob_func
_set_fmode
__p__commode
_configthreadlocale
DotNetRuntimeDebugHeader
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ