Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
0x000600000001a9ca-233.exe
Resource
win10-20231023-en
Behavioral task
behavioral2
Sample
0x000600000001a9ca-233.exe
Resource
win10v2004-20231127-en
Target
0x000600000001a9ca-233
Size
897KB
MD5
5598a4c4a5f166060bde5f6983522f44
SHA1
36fee640c8a9a035ab570d59a2f01b6dda3f2712
SHA256
896f1793ca8bda909a71217f41a93af5a06354c1ea9ea81c975d429224b28e19
SHA512
e689636c1b041e29981c6b17e0b007891d50da40e9ff203e35adfd27195ebd5af9137ef283ea0bfc623661cf0e31893f69fc1b4d2ca8ebc745ec74aa54b4ee5d
SSDEEP
24576:520JthPZw6jhAXPddQmdb2LIq7qJtW6vcieTw6nXK:53Te6jhEFdNdb2LIq7Kv3eM3
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
EnumerateTraceGuids
ControlTraceW
TraceMessage
EventWriteTransfer
StartTraceW
EnableTrace
CloseServiceHandle
RegCloseKey
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
LookupPrivilegeValueW
SetSecurityDescriptorDacl
AdjustTokenPrivileges
AllocateAndInitializeSid
CopySid
FreeSid
CheckTokenMembership
InitializeSecurityDescriptor
InitializeAcl
QueryServiceStatusEx
OpenServiceW
StartServiceW
OpenSCManagerW
QueryServiceStatus
EventUnregister
EventRegister
OpenThreadToken
OpenProcessToken
DecryptFileW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegNotifyChangeKeyValue
GetTokenInformation
GetLengthSid
AddAccessAllowedAce
GetCurrentProcessId
GetLastError
SetEndOfFile
SetLastError
FreeLibrary
Sleep
CloseHandle
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThread
GetCurrentThreadId
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStdHandle
GetFileType
GetStartupInfoW
GetTempPathW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetProcAddress
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
MultiByteToWideChar
ExitProcess
GetModuleHandleW
GetModuleHandleExW
GetProcessHeap
WideCharToMultiByte
SetStdHandle
GetFileSizeEx
SetFilePointerEx
ReadFile
GetConsoleMode
ReadConsoleW
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetModuleFileNameW
HeapSize
HeapReAlloc
CreateFileW
WriteConsoleW
RaiseException
QueryPerformanceCounter
InitializeSListHead
EncodePointer
InitializeCriticalSectionEx
SetFileAttributesW
CopyFileW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetProcessTimes
GetCommandLineW
SetWaitableTimer
CreateWaitableTimerW
CreateDirectoryW
CancelIo
CreateNamedPipeW
InitializeProcThreadAttributeList
GetNamedPipeClientProcessId
PeekNamedPipe
FindClose
DisconnectNamedPipe
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
VirtualQuery
ConnectNamedPipe
GetThreadTimes
SizeofResource
SetFileTime
VirtualUnlock
SetFilePointer
LockResource
LoadResource
FindResourceW
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
GlobalMemoryStatusEx
DeleteFileW
GetEnvironmentVariableW
GetSystemDirectoryW
FormatMessageW
GetNativeSystemInfo
HeapSetInformation
GetCurrentDirectoryW
LocalFree
CreateProcessW
GetSystemWindowsDirectoryW
GetExitCodeProcess
FindFirstFileW
GetFullPathNameW
FindNextFileW
ExpandEnvironmentStringsW
RemoveDirectoryW
WaitForSingleObject
GetFileAttributesW
OpenProcess
CreateEventW
SetEvent
WaitForSingleObjectEx
ResetEvent
QueryPerformanceFrequency
VirtualLock
WaitForMultipleObjects
FindFirstFileExW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
DecodePointer
UuidCreate
UuidFromStringW
RtlNtStatusToDosError
NtQueryInformationFile
NtQueryInformationProcess
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlGetVersion
NtSetInformationFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ