Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
e65062b959c00d90c04e7f6bfa9b54d0_exe64.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e65062b959c00d90c04e7f6bfa9b54d0_exe64.exe
Resource
win10v2004-20230915-en
Target
e65062b959c00d90c04e7f6bfa9b54d0_exe64.exe
Size
365KB
MD5
e65062b959c00d90c04e7f6bfa9b54d0
SHA1
35b0add6e1939c025908aad47887068aac416315
SHA256
fe004b31c285c3c95766d5d129734cd5479ac5a4f78ae403b136c7df4e72dd1e
SHA512
79ea16986c52e2dc50cea6b8d5c96732f4d72956317de48861efa702100c828fad9258c04adbfc5e985e03d1108064843e48c87f0b2695ff4527c19b33e73b89
SSDEEP
6144:+ygPCmKkJ7n4T0bMw+HxTwFyE/ndVX66gRSeYGY9IdDhFZGR:+1Pgk1C0bM7wzP3X6byGY9IdDhFZG
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceMessage
EventWriteTransfer
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
EventUnregister
EventRegister
OpenThreadToken
OpenProcessToken
GetLengthSid
CheckTokenMembership
FreeSid
CopySid
AllocateAndInitializeSid
CloseHandle
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
SetLastError
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThread
GetCurrentThreadId
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
FreeLibrary
GetProcAddress
LoadLibraryExW
CompareStringW
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
MultiByteToWideChar
ExitProcess
GetModuleHandleW
GetModuleHandleExW
GetProcessHeap
WideCharToMultiByte
HeapSize
HeapReAlloc
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
EncodePointer
RaiseException
InitializeCriticalSectionEx
CallNamedPipeW
InitializeProcThreadAttributeList
FindClose
CreateToolhelp32Snapshot
UpdateProcThreadAttribute
Process32NextW
Process32FirstW
DeleteProcThreadAttributeList
WaitNamedPipeW
VirtualQuery
FlushFileBuffers
GetProcessId
GetProcessTimes
GetCommandLineW
GetThreadTimes
GetModuleFileNameW
GetEnvironmentVariableW
GetSystemDirectoryW
HeapSetInformation
CreateProcessW
FindNextFileW
WriteFile
SetEnvironmentVariableW
WaitForSingleObject
CreateFileW
GetFileAttributesW
OpenProcess
CreateEventW
SetEvent
WaitForSingleObjectEx
ResetEvent
SetFilePointerEx
QueryFullProcessImageNameW
VirtualLock
GetStdHandle
GetCommandLineA
FindFirstFileExW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
DecodePointer
UuidCreate
RtlNtStatusToDosError
NtQueryInformationProcess
RtlGetVersion
RtlPcToFileHeader
RtlUnwindEx
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwind
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ