Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
30871838cccaa52d8d99195969509454.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
30871838cccaa52d8d99195969509454.exe
Resource
win10v2004-20231215-en
Target
30871838cccaa52d8d99195969509454
Size
2.1MB
MD5
30871838cccaa52d8d99195969509454
SHA1
86c160bd03bc2967e66ee78d17110fbef4fe6131
SHA256
9843da0234145d9ca5cb3a5b389db04bd285b2bca8ee265e5b99d2ad3de17f23
SHA512
54514b37144e84795ebeb44d6c1a3f760017d8075a292e54c28daff4d4877968030b45b5f89e204f4b475429102e58d9054320ce34ab6b49c2e4a8fbc61bd7dc
SSDEEP
49152:dgyrkMY8zYZx1970lO+gFiQknJXE4/d8wESU+tc1aW:dTQ7/B5BiQkn+gd8LSBtckW
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetDriveTypeW
InterlockedCompareExchange
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
GetLocalTime
SetUnhandledExceptionFilter
ExitProcess
IsBadReadPtr
VirtualProtect
ProcessIdToSessionId
InterlockedDecrement
DeviceIoControl
FileTimeToLocalFileTime
GetProcessTimes
SetFilePointer
InterlockedExchange
MulDiv
CreateThread
RaiseException
GlobalUnlock
GlobalLock
GlobalAlloc
FlushInstructionCache
OutputDebugStringW
LoadLibraryExW
lstrlenW
lstrcmpW
InterlockedIncrement
lstrcmpiW
SetEvent
CreateEventW
GetUserDefaultUILanguage
SetCurrentDirectoryW
GetFileAttributesExW
GetSystemPowerStatus
LocalAlloc
ReadFile
ExpandEnvironmentStringsW
Process32NextW
GetCurrentProcessId
GetCurrentThreadId
FreeConsole
MultiByteToWideChar
WideCharToMultiByte
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
GetLastError
CreateFileMappingW
MapViewOfFile
GetFileSize
FileTimeToSystemTime
DeleteAtom
FindAtomW
AddAtomW
OpenThread
GetAtomNameW
LoadLibraryW
FormatMessageW
SetFilePointerEx
lstrlenA
lstrcmpiA
lstrcmpA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetConsoleCtrlHandler
FlushFileBuffers
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetDateFormatA
GetTimeFormatA
FatalAppExitA
HeapCreate
GetModuleFileNameA
GetStdHandle
GetCurrentThread
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
MoveFileW
GetStartupInfoW
ExitThread
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
RtlUnwind
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
ResetEvent
GetModuleHandleA
GetTimeZoneInformation
SetLastError
LocalFree
GetPrivateProfileStringW
GlobalFree
Sleep
CreateMutexW
GetWindowsDirectoryW
GetCurrentProcess
CreateRemoteThread
GetVersion
GetTickCount
GetModuleFileNameW
GetVersionExW
GetSystemInfo
CreateToolhelp32Snapshot
GetSystemTime
GetTempPathW
GetTempFileNameW
WriteFile
GetModuleHandleW
GetProcAddress
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
UnmapViewOfFile
DeleteFileW
CreateFileW
GetFileSizeEx
CloseHandle
SystemTimeToFileTime
LocalFileTimeToFileTime
FindFirstFileW
FindNextFileW
Process32FirstW
MoveFileExW
SetFileAttributesW
RemoveDirectoryW
GetFileAttributesW
FindClose
WritePrivateProfileStringW
WaitForMultipleObjects
LoadLibraryA
GetSystemDefaultUILanguage
GetSystemDirectoryW
GetExitCodeThread
GetComputerNameW
WTSGetActiveConsoleSessionId
TerminateProcess
OpenProcess
ReleaseMutex
OpenMutexW
QueryDosDeviceW
GetLogicalDriveStringsW
TerminateThread
GetBinaryTypeW
CreateDirectoryW
SetErrorMode
DdeFreeDataHandle
UnregisterHotKey
DrawStateW
CharUpperA
LoadIconA
EngPaint
GetMetaFileA
GdiIsMetaPrintDC
NamedEscape
SetStretchBltMode
GdiTransparentBlt
SetSystemPaletteUse
ExtTextOutW
GdiEntry13
DeleteEnhMetaFile
GdiConvertBrush
CreateDIBPatternBrushPt
SetTextColor
GetEUDCTimeStampExW
GetTextFaceAliasW
CreatePolyPolygonRgn
AddFontResourceW
EngLoadModule
GdiConvertToDevmodeW
CLIPOBJ_bEnum
XLATEOBJ_piVector
Arc
FONTOBJ_pxoGetXform
GetFontAssocStatus
XFORMOBJ_iGetXform
PtInRegion
GdiComment
GetDIBits
GdiEntry8
GetCharWidth32A
FlattenPath
GetClipBox
AbortPath
SetFontEnumeration
PolylineTo
GetStretchBltMode
SetViewportExtEx
bInitSystemAndFontsDirectoriesW
Ellipse
EngCreateSemaphore
EngEraseSurface
CreateFontIndirectExA
GdiCreateLocalEnhMetaFile
GetKerningPairs
GetStockObject
EngCreateBitmap
RealizePalette
RegQueryValueExA
RegOpenKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ