Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5dbbd406eba830efef85601018061b315ffdb23ce83436f1c9bbae08fd757c57.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
5dbbd406eba830efef85601018061b315ffdb23ce83436f1c9bbae08fd757c57.exe
Resource
win10v2004-20231020-en
Target
5dbbd406eba830efef85601018061b315ffdb23ce83436f1c9bbae08fd757c57
Size
849KB
MD5
9b74010f37bd8850165b83ca853c3fd2
SHA1
26c5f225d2543c3fcfb6a35d13a343f88bfca635
SHA256
5dbbd406eba830efef85601018061b315ffdb23ce83436f1c9bbae08fd757c57
SHA512
401f4fb0464531635c993f1641cbcb39f121c98b2c437cc5486ea58763d278bec27c2c009e3b155e7273d389ab0d42b7c23cff62351ab1f8036c11230b5a8d56
SSDEEP
12288:0RdEdcd9CsOq45Jt04OA6dGQeMQu2np4qtoykVBrZuITyxyEejBjvrEH79Jy:HcdwrLJVNQJQ5Rto3VJZufyEe5rEH79M
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserW
AddAccessAllowedAce
AddAce
CopySid
DeleteAce
EqualSid
GetAce
GetAclInformation
GetLengthSid
GetSecurityDescriptorDacl
GetTokenInformation
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
LookupPrivilegeValueW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
InitiateSystemShutdownW
OpenThreadToken
AccessCheck
DuplicateToken
GetNamedSecurityInfoW
GetFileSecurityW
ImpersonateSelf
MapGenericMask
RevertToSelf
RegOpenKeyExA
RegCreateKeyExW
GetSecurityInfo
GetUserNameW
RegDeleteKeyW
RegEnumKeyExW
RegEnumValueW
AddAccessAllowedAceEx
GetSecurityDescriptorControl
SetSecurityDescriptorControl
SetSecurityDescriptorOwner
GetExplicitEntriesFromAclW
RegQueryValueExA
RegSetValueExA
KillTimer
MessageBoxA
MessageBoxW
CloseDesktop
SetTimer
PostQuitMessage
OpenDesktopW
LoadStringW
OpenWindowStationW
CloseWindowStation
SetProcessWindowStation
GetProcessWindowStation
SetUserObjectSecurity
GetUserObjectSecurity
LoadStringA
ExitWindowsEx
PeekMessageA
GetDesktopWindow
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoQueryProxyBlanket
CoSetProxyBlanket
SysAllocString
SysFreeString
VariantInit
VariantClear
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
SHGetFolderPathW
WTSEnumerateSessionsA
WTSFreeMemory
BackupWrite
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
ReadConsoleW
HeapReAlloc
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapAlloc
HeapFree
ExitProcess
GetStdHandle
GetTimeZoneInformation
PeekNamedPipe
GetConsoleMode
GetConsoleOutputCP
SetStdHandle
FreeLibraryAndExitThread
CreateThread
TlsFree
RtlUnwind
GetStartupInfoW
InitializeSListHead
CreateEventW
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
DecodePointer
EncodePointer
InitializeCriticalSectionEx
GetStringTypeW
GetSystemFirmwareTable
ExitThread
InitializeCriticalSection
IsDebuggerPresent
GetACP
QueryPerformanceFrequency
QueryPerformanceCounter
MultiByteToWideChar
GetOverlappedResult
GetFileAttributesW
WriteConsoleW
WideCharToMultiByte
GetModuleHandleExW
Process32Next
Process32First
CreateToolhelp32Snapshot
VerifyVersionInfoA
GetProductInfo
GetNativeSystemInfo
VerSetConditionMask
SetEnvironmentVariableW
OutputDebugStringA
CloseHandle
GetLastError
SetEvent
WaitForMultipleObjectsEx
CreateEventA
Sleep
GetCurrentProcess
FreeLibrary
GetModuleHandleA
GetModuleHandleW
GetProcAddress
LoadLibraryA
SetDllDirectoryW
VerifyVersionInfoW
SetConsoleCtrlHandler
GetCommandLineW
DuplicateHandle
SetLastError
WaitForSingleObject
TerminateProcess
GetExitCodeProcess
CreateProcessW
OpenProcess
LoadLibraryW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTickCount64
CreateFileW
RaiseException
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualQuery
IsBadReadPtr
GetCurrentThread
FlushFileBuffers
ReadFile
SetEndOfFile
SetFilePointerEx
WriteFile
CreateDirectoryW
DeleteFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileType
GetVolumeInformationW
RemoveDirectoryW
LocalFree
MoveFileExW
GetFileInformationByHandle
GetDriveTypeW
GetProcessTimes
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
FormatMessageW
GetCurrentDirectoryW
CreateFileA
GetVersionExA
LoadLibraryExW
GetFileSizeEx
CopyFileW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
InitializeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
GetFullPathNameW
SetFileAttributesW
GetModuleFileNameW
GetFileAttributesA
OutputDebugStringW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
GetDiskFreeSpaceW
GetLogicalDriveStringsW
GetTempPathW
GetComputerNameExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ