Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
16de1ba4b8e4bc712c551b39ed2c5c1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16de1ba4b8e4bc712c551b39ed2c5c1a.exe
Resource
win10v2004-20231215-en
Target
16de1ba4b8e4bc712c551b39ed2c5c1a
Size
1019KB
MD5
16de1ba4b8e4bc712c551b39ed2c5c1a
SHA1
4ae9c9987d0c73e166e2b1ee8ab2d9dc92975c12
SHA256
50fdf678a355fbd6ec1be340eaf27fbacfadf75030f87188f027a64e4b05697d
SHA512
dc173957e75417b9360e3a51ed2e522b0d1e041cea325e9c822f11d3ea552aa1aed18925e3b037a6d686c905e3dc1d51b4fd8883ae0e56ba38d03063c4aa5a05
SSDEEP
24576:I2xF65BAnTMFXLUvHHROjNhLlNgAFKUPq+FcxM:qMnTaXYvn8HLL9FNPqccxM
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrNCatA
StrChrA
StrToIntA
StrStrIA
wnsprintfA
UuidCreate
UuidToStringA
Sleep
CreateThread
GetLocalTime
GetVersionExA
lstrcpyA
GetTickCount
GetCurrentProcessId
MoveFileExA
GetExitCodeProcess
lstrcatA
GetModuleFileNameA
WinExec
GetTempPathA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
GetModuleHandleA
ExitProcess
GetLastError
CreateMutexA
MultiByteToWideChar
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetFullPathNameA
DosDateTimeToFileTime
SetFileTime
GetFileTime
LocalFileTimeToFileTime
RtlUnwind
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStdHandle
HeapReAlloc
DeleteCriticalSection
VirtualFree
HeapCreate
LeaveCriticalSection
EnterCriticalSection
RaiseException
LCMapStringW
WideCharToMultiByte
LCMapStringA
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
HeapSize
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
ReadFile
GetConsoleCP
GetConsoleMode
SetFilePointer
GetStringTypeA
GetStringTypeW
CreateDirectoryA
lstrlenA
DeleteFileA
LoadLibraryA
GetProcAddress
GetCurrentProcess
FreeLibrary
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
CreateFileA
CloseHandle
CreateToolhelp32Snapshot
Process32Next
Process32First
lstrcpynA
VirtualAlloc
GetLocaleInfoA
SetEndOfFile
GetEnvironmentStrings
RedrawWindow
DrawTextA
EnableWindow
FillRect
GetDlgItem
SetWindowTextA
SetCursor
SetFocus
EndPaint
GetKeyState
GetFocus
LoadBitmapA
GetParent
PeekMessageA
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
InvalidateRect
ReleaseDC
PostMessageA
UpdateWindow
DestroyWindow
keybd_event
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SendMessageA
IsDialogMessageA
TranslateMessage
MapVirtualKeyA
MessageBoxA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
ExitWindowsEx
GetWindowThreadProcessId
EnumWindows
GetClassNameA
IsWindowEnabled
GetWindowDC
SetBkColor
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
CreateDIBitmap
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
GetStockObject
TextOutA
SelectObject
RegSetValueExA
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegOpenKeyExA
RegCreateKeyA
RegQueryValueExA
OpenProcessToken
RegCloseKey
RegOpenKeyA
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupPrivilegeValueA
SetFileSecurityA
AdjustTokenPrivileges
RegEnumKeyA
ShellExecuteExA
ShellExecuteA
SHGetFolderPathA
CoTaskMemAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ