Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
200f05236cba473a4c2e90c73288e6b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
200f05236cba473a4c2e90c73288e6b2.exe
Resource
win10v2004-20231215-en
Target
200f05236cba473a4c2e90c73288e6b2
Size
891KB
MD5
200f05236cba473a4c2e90c73288e6b2
SHA1
a5da01846925d071e4f0a5ff049079031f13e585
SHA256
7870c5bc2178b46f74cc641fb4d3c39f1f3d3835a3ebc15c280860dce9c4b9ca
SHA512
0cb20d8477ddb7d47d6fd8aac816d7e7c5d7c34a03b1b0a2402cfb55da6e860ce61329254e4c2d496ce8d39242692a201315590e4f150ff6877eb2c9a565902e
SSDEEP
6144:CzAU03j/9flN5gYT1eGy1/xCNOfW+AObve8scHVrwANcm/7dl:CzAFb9flN5go1E/eOfW+htsc5wscm/7D
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LPtoDP
GetObjectW
SetTextColor
SetBkMode
SetBkColor
SelectObject
GetStockObject
CreateFontIndirectW
TranslateMessage
DispatchMessageW
SetWindowsHookExW
CallNextHookEx
GetMessageW
SystemParametersInfoW
LoadIconW
LoadBitmapW
GetParent
GetWindowLongW
GetSysColor
ScreenToClient
GetWindowRect
GetClientRect
SetWindowTextW
ReleaseDC
GetDC
DrawTextW
EnableWindow
KillTimer
SetTimer
GetDlgItem
CreateDialogParamW
MoveWindow
ShowWindow
PostQuitMessage
SendMessageW
PostThreadMessageW
PeekMessageW
IsDialogMessageW
GetSysColorBrush
RegOpenKeyExW
RegQueryValueExW
RegDeleteKeyW
RegQueryInfoKeyW
RegDeleteKeyValueW
RegDeleteTreeW
CloseServiceHandle
ControlService
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
DeleteService
RegCloseKey
SetFilePointerEx
ReadFile
GetConsoleMode
GetTimeZoneInformation
FlushFileBuffers
EnumSystemLocalesW
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetACP
WriteFile
GetStdHandle
GetModuleFileNameA
GetProcessHeap
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
HeapSize
WriteConsoleW
ReadConsoleW
GetConsoleCP
GetPrivateProfileStringW
CloseHandle
ReleaseMutex
WaitForSingleObject
CreateMutexW
GetCurrentThreadId
GetModuleFileNameW
MoveFileExW
GetCommandLineW
FindClose
FindFirstFileW
FindNextFileW
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
CreateEventW
Sleep
TerminateProcess
CreateThread
TerminateThread
OpenProcess
GetTickCount
QueryFullProcessImageNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
Module32NextW
LoadResource
LockResource
SizeofResource
FindResourceW
EnumResourceNamesW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetModuleHandleW
CompareFileTime
CreateFileW
DeleteFileW
GetFileAttributesW
GetTempFileNameW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
GetProcessTimes
GetCurrentProcessId
CreateProcessW
FreeLibrary
GetProcAddress
LoadLibraryW
GetLocaleInfoW
GetUserDefaultLCID
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalFree
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetCPInfo
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
OutputDebugStringW
HeapReAlloc
HeapFree
HeapAlloc
GetModuleHandleExW
ExitProcess
LoadLibraryExW
RtlUnwind
SetEndOfFile
CoTaskMemFree
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
SHGetFolderPathW
ord165
SHCreateDirectoryExW
SHFileOperationW
CommandLineToArgvW
ord155
SHParseDisplayName
SHCreateShellItem
VariantClear
VariantInit
SysFreeString
SysAllocStringLen
PathIsDirectoryEmptyW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ