Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
47caf238a855e61e03d575b1ac6e4d53.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47caf238a855e61e03d575b1ac6e4d53.exe
Resource
win10v2004-20231215-en
Target
47caf238a855e61e03d575b1ac6e4d53
Size
1.1MB
MD5
47caf238a855e61e03d575b1ac6e4d53
SHA1
df3a68e3a57dc5c04ec762cc108885a54efaa400
SHA256
d8fde273b7f3b3aa05cd3373a8ddb487aa10d8c65f4eb43cb3bed018eef3aad5
SHA512
a822177e278425399baf0454b8a3c90627f07d5d9657d76921bc57e7cef3e8133de70dff990de129f21a0d5b8dba3a377c0db2bb42c969b03be582dbe1cdeaf6
SSDEEP
24576:zl63YTW1TranGNWc/0vwPOCc9LecoLLErWEsaiUuc7yK4dZ2oX:c3ioTunG/0vw2CczUQrfsbTcOd/
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
UuidCreate
UuidToStringA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
InitializeCriticalSection
DeleteCriticalSection
LoadResource
SizeofResource
FindResourceA
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
LoadLibraryExA
FreeLibrary
IsDBCSLeadByte
GetCurrentThreadId
GetCurrentProcess
SetLastError
GetFileAttributesA
WritePrivateProfileStringA
CreateThread
WaitForSingleObject
CreateProcessA
WinExec
GetComputerNameA
GetVolumeInformationA
GetTickCount
GetCurrentProcessId
HeapReAlloc
SetFilePointer
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetStringTypeW
WideCharToMultiByte
LCMapStringW
LCMapStringA
HeapSize
GetStdHandle
TlsFree
TlsSetValue
LeaveCriticalSection
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
GetStartupInfoA
GetCommandLineA
GetConsoleMode
GetConsoleCP
GetFileType
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
VirtualAlloc
VirtualFree
WriteConsoleW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
RtlUnwind
GetLocaleInfoA
FlushFileBuffers
GetPrivateProfileStringA
GetConsoleOutputCP
lstrlenA
lstrcatA
lstrcpynA
GetTempPathA
lstrcpyA
HeapFree
WriteFile
DeleteFileA
GetProcessHeap
HeapAlloc
CreateDirectoryA
EnterCriticalSection
RaiseException
MultiByteToWideChar
GetExitCodeProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
Sleep
GetVersionExA
ExitProcess
CreateMutexA
LoadLibraryA
GetProcAddress
lstrcmpA
lstrcmpiA
TlsAlloc
lstrlenW
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
CloseHandle
GetLastError
LocalFree
LocalAlloc
SetStdHandle
SetEndOfFile
WriteConsoleA
GetStringTypeA
RedrawWindow
GetParent
IsWindow
GetFocus
SetCursor
UpdateWindow
IsDlgButtonChecked
PostMessageA
CheckRadioButton
SystemParametersInfoA
LoadIconA
ExitWindowsEx
GetWindowTextLengthA
GetWindowTextA
DestroyWindow
LoadCursorA
CharNextA
MessageBoxA
FillRect
GetWindowRect
GetDlgCtrlID
GetDlgItem
EnableWindow
SetWindowTextA
EndPaint
RegisterClassExA
GetWindowDC
BeginPaint
DrawFocusRect
SetWindowLongA
InvalidateRect
ReleaseDC
SetForegroundWindow
FindWindowA
IsDialogMessageA
SetFocus
TranslateMessage
DispatchMessageA
GetMessageA
ShowWindow
SendMessageA
PostQuitMessage
GetClientRect
GetDC
CreateWindowExA
DefWindowProcA
GetWindowLongA
UnregisterClassA
DeleteObject
DeleteDC
BitBlt
GetObjectA
CreateCompatibleDC
CreateSolidBrush
SetBkColor
SetTextColor
SelectObject
TextOutA
CreateFontA
SetBkMode
GetStockObject
CreateDIBitmap
RegSetValueExA
AdjustTokenPrivileges
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
FreeSid
SetFileSecurityA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
RegCloseKey
RegQueryInfoKeyA
OpenProcessToken
CheckTokenMembership
LookupPrivilegeValueA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
SHGetFolderPathA
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
VarUI4FromStr
wnsprintfA
StrStrIA
StrStrA
AssocQueryStringA
StrNCatA
StrToIntA
PathFileExistsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ