Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
28d87d3406e04ba9138ac70a786027c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28d87d3406e04ba9138ac70a786027c4.exe
Resource
win10v2004-20231215-en
Target
28d87d3406e04ba9138ac70a786027c4
Size
2.6MB
MD5
28d87d3406e04ba9138ac70a786027c4
SHA1
f135cf2a1ea3e3a7664ad0d8a54cbf5f55a0d72e
SHA256
f609f9fa6e1d87e89d9feebd7efa5d4f25e608d2a33a65f1476eb52e5023b0f1
SHA512
8f964f3e953aa48604eb39b96a846562a928bfe713780b8b5d474895b474917bc8ad473e329ae19f262e560f1e547bb8a44705043c0f619fb78b1e7b618ee1d5
SSDEEP
49152:k+buog/TXJwOZtKKi+buog/TXJwOZtKKKKi+buog/TXJwOZ:k+kK+kk+k
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentThemeName
GetFileSizeEx
CloseHandle
CreateDirectoryW
GetLastError
WideCharToMultiByte
GetSystemWow64DirectoryW
GetSystemDirectoryW
VerSetConditionMask
VerifyVersionInfoW
GetModuleHandleW
GetProcAddress
GetCommandLineW
SetLastError
GetModuleHandleA
LoadLibraryA
LoadLibraryW
GetModuleFileNameW
OutputDebugStringA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetCurrentThreadId
DecodePointer
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
GetUserDefaultUILanguage
GetVersionExW
CreateFileW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetFileType
SetFilePointerEx
ReadFile
LCMapStringW
HeapReAlloc
HeapSize
GetStringTypeW
GetFileAttributesW
FindClose
DeleteFileW
FindNextFileW
FindFirstFileW
SystemTimeToFileTime
GetSystemTime
RemoveDirectoryW
MultiByteToWideChar
WriteConsoleW
FlushFileBuffers
SetEndOfFile
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
RtlUnwind
LoadLibraryExW
FreeLibrary
TlsFree
IsDebuggerPresent
OutputDebugStringW
EncodePointer
HeapAlloc
HeapFree
GetProcessHeap
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
TlsGetValue
TlsSetValue
GetDesktopWindow
SendMessageW
SetWindowPos
CreateWindowExW
MapWindowPoints
ClientToScreen
ReleaseDC
GetDC
GetNextDlgTabItem
GetFocus
EndDialog
GetWindowTextW
GetWindowTextLengthW
SetFocus
DestroyWindow
CallWindowProcW
DefWindowProcW
MoveWindow
GetWindowRect
GetClientRect
DialogBoxParamW
GetActiveWindow
MessageBoxW
SetWindowLongW
GetParent
GetWindowLongW
GetWindow
EnableWindow
ShowWindow
GetDlgItem
SetWindowTextW
UnregisterClassW
SelectObject
GetTextExtentPoint32W
CheckTokenMembership
AllocateAndInitializeSid
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
FreeSid
SHGetFolderPathW
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
SHFileOperationW
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ