Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2bbb8b2314d405e100ba33480c387f04.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2bbb8b2314d405e100ba33480c387f04.exe
Resource
win10v2004-20231215-en
Target
2bbb8b2314d405e100ba33480c387f04
Size
796KB
MD5
2bbb8b2314d405e100ba33480c387f04
SHA1
34e8d7d75bdc82ac6eb03d7030d1e15f5c551b5f
SHA256
a452259af38636462bf746a8148b158c99c7e52d3a3ab1082bc5fda735a4632e
SHA512
9a634cabb6ac168c900e2b1e30dad07c84be42de36d6d8f53b3632baeedf44957e6169fe0d536f4fc00e68dd3adcc0d85f690b5f3dd68f7a847f764cc4e0ba45
SSDEEP
12288:wUrQOaT0xDNr7sKDFIHem4h/MJYdBfmkUkS+ixpNAJfQMtcx:n0JT8DBDDFI+m4h/MABJSZKQMyx
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrChrA
StrToIntA
StrStrA
StrStrIA
wnsprintfA
StrNCatA
UuidToStringA
UuidCreate
Sleep
CreateThread
GetLocalTime
GetVersionExA
lstrcpyA
GetTickCount
GetCurrentProcessId
MoveFileExA
GetExitCodeProcess
GetModuleFileNameA
WinExec
GetTempPathA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
ExitProcess
GetLastError
CreateMutexA
MultiByteToWideChar
LocalAlloc
GetModuleHandleA
LocalFree
OpenProcess
TerminateProcess
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
GetStringTypeA
VirtualAlloc
EnterCriticalSection
CreateDirectoryA
DeleteCriticalSection
VirtualFree
HeapCreate
RaiseException
LCMapStringW
WideCharToMultiByte
LCMapStringA
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
GetConsoleMode
HeapSize
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
WriteConsoleA
GetConsoleOutputCP
GetStringTypeW
GetLocaleInfoA
RtlUnwind
lstrlenA
LoadLibraryA
GetProcAddress
GetCurrentProcess
FreeLibrary
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
CreateFileA
CloseHandle
CreateToolhelp32Snapshot
Process32Next
Process32First
lstrcpynA
LeaveCriticalSection
QueryPerformanceCounter
SetFilePointer
WriteConsoleW
FlushFileBuffers
HeapReAlloc
FillRect
EnableWindow
CheckRadioButton
IsDlgButtonChecked
GetWindowTextLengthA
RedrawWindow
GetDlgItem
SetWindowTextA
SetCursor
SetFocus
EndPaint
GetKeyState
GetFocus
LoadBitmapA
GetParent
IsWindowEnabled
DrawTextA
GetDC
GetWindowTextA
SetWindowLongA
InvalidateRect
ReleaseDC
PostMessageA
UpdateWindow
DestroyWindow
keybd_event
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SendMessageA
IsDialogMessageA
TranslateMessage
MapVirtualKeyA
MessageBoxA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
ExitWindowsEx
GetWindowThreadProcessId
EnumWindows
GetClassNameA
BeginPaint
PeekMessageA
SetBkColor
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
GetStockObject
TextOutA
CreateDIBitmap
SetEntriesInAclA
RegOpenKeyExA
RegCreateKeyA
RegQueryValueExA
OpenProcessToken
RegCloseKey
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupPrivilegeValueA
AllocateAndInitializeSid
FreeSid
SetFileSecurityA
AdjustTokenPrivileges
RegSetValueExA
SHGetFolderPathA
ShellExecuteExA
ShellExecuteA
CoTaskMemAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ