Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
3eb5eca4652453d7c9885fe641c3ab4c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3eb5eca4652453d7c9885fe641c3ab4c.exe
Resource
win10v2004-20231215-en
Target
3eb5eca4652453d7c9885fe641c3ab4c
Size
998KB
MD5
3eb5eca4652453d7c9885fe641c3ab4c
SHA1
4b501742b58dba778d8101c13d33be4a7a5e8022
SHA256
1911459347b9f448b1b692dabd26ba9b1af9464f6eb9b5a69b79f3590aa5673d
SHA512
5a6c2c8a9a73e87603afc3161661dd16d0fb1dbe080b80697ceb1a1756c37e3895fca94921eec0e78db64ad754dc973c27da82d3bdce7fa8e09aacedb35be46d
SSDEEP
24576:7Xgm/tTrlOCqSuD7VN84FKjWrOhGIErdCnB:0mVTcC3aVN83q8G1r8
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
UuidToStringA
UuidCreate
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
CreateProcessA
WinExec
GetComputerNameA
GetVolumeInformationA
GetTickCount
GetCurrentProcessId
HeapReAlloc
SetFilePointer
GetModuleHandleA
GetCurrentProcess
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
MultiByteToWideChar
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
GetLocaleInfoA
HeapSize
RtlUnwind
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEndOfFile
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetHandleCount
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapCreate
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
RaiseException
FreeLibrary
WaitForSingleObject
CreateThread
WritePrivateProfileStringA
GetFileAttributesA
GetExitCodeProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
Sleep
GetTempPathA
GetVersionExA
ExitProcess
CreateMutexA
LoadLibraryA
GetProcAddress
lstrcmpiA
lstrcmpA
GetPrivateProfileStringA
lstrlenA
lstrcatA
lstrcpynA
lstrcpyA
HeapFree
WriteFile
DeleteFileA
GetProcessHeap
HeapAlloc
CreateDirectoryA
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
CloseHandle
GetLastError
LocalFree
LocalAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
GetFileType
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
CreateWindowExA
DefWindowProcA
GetWindowLongA
GetDC
GetClientRect
PostQuitMessage
SendMessageA
GetMessageA
DispatchMessageA
ExitWindowsEx
GetParent
LoadIconA
RedrawWindow
ShowWindow
IsWindow
SystemParametersInfoA
GetWindowTextLengthA
CheckRadioButton
PostMessageA
GetWindowTextA
IsDlgButtonChecked
GetFocus
UpdateWindow
SetCursor
DestroyWindow
LoadCursorA
MessageBoxA
FillRect
GetWindowRect
GetDlgCtrlID
GetDlgItem
EnableWindow
SetWindowTextA
EndPaint
RegisterClassExA
GetWindowDC
BeginPaint
DrawFocusRect
SetWindowLongA
InvalidateRect
ReleaseDC
IsDialogMessageA
SetForegroundWindow
FindWindowA
SetFocus
TranslateMessage
CreateDIBitmap
DeleteObject
DeleteDC
BitBlt
GetObjectA
CreateCompatibleDC
CreateSolidBrush
SetBkColor
SetTextColor
SelectObject
TextOutA
CreateFontA
SetBkMode
GetStockObject
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueA
CheckTokenMembership
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
FreeSid
SetFileSecurityA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
ShellExecuteExA
SHGetFolderPathA
ShellExecuteA
SHGetSpecialFolderPathA
CoTaskMemAlloc
PathFileExistsA
AssocQueryStringA
StrNCatA
StrToIntA
wnsprintfA
StrStrA
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ