Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
7a929399ca66a7cd1d2d8cda161a7115.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a929399ca66a7cd1d2d8cda161a7115.exe
Resource
win10v2004-20231215-en
Target
7a929399ca66a7cd1d2d8cda161a7115
Size
1003KB
MD5
7a929399ca66a7cd1d2d8cda161a7115
SHA1
7b943ba733d35b34460973632a3c5aefc4d0cdee
SHA256
5b8c6bddfff030196559151c5d94e1d9e2feb99daa3d22ddb83d7347a8f802a2
SHA512
117e2ea63726c7308b0e8727b8eb53eefc2e09c0cf43488f2480ba385a634c8aafdb8be8b8f454455d5b3a4d94406d3787abd15115c175cd16200bb68f65589c
SSDEEP
24576:kpx/Rm/UzTpG6gkSB1rRyrYqbpO+5TWkpwVL8w:qm8zTpOroZE+5TWAWL8w
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrNCatA
StrToIntA
StrStrIA
wnsprintfA
StrChrA
UuidCreate
UuidToStringA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
CreateDirectoryA
Sleep
CreateThread
GetLocalTime
GetVersionExA
lstrcpyA
GetTickCount
GetCurrentProcessId
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
MoveFileExA
GetExitCodeProcess
lstrcatA
GetModuleFileNameA
WinExec
GetTempPathA
lstrcmpiA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
GetModuleHandleA
ExitProcess
GetLastError
CreateMutexA
MultiByteToWideChar
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetFullPathNameA
DosDateTimeToFileTime
SetFileTime
GetFileTime
LocalFileTimeToFileTime
GetEnvironmentStringsW
lstrlenA
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
HeapReAlloc
VirtualAlloc
DeleteFileA
VirtualFree
HeapCreate
LeaveCriticalSection
EnterCriticalSection
RaiseException
LCMapStringW
WideCharToMultiByte
LCMapStringA
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
GetLocaleInfoA
HeapSize
InitializeCriticalSectionAndSpinCount
SetStdHandle
LoadLibraryA
SetHandleCount
GetFileType
QueryPerformanceCounter
RtlUnwind
ReadFile
GetConsoleCP
GetConsoleMode
SetFilePointer
GetStringTypeA
GetStringTypeW
GetProcAddress
GetCurrentProcess
FreeLibrary
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
CreateFileA
CloseHandle
CreateToolhelp32Snapshot
Process32Next
Process32First
lstrcpynA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
DeleteCriticalSection
FlushFileBuffers
SetEndOfFile
FreeEnvironmentStringsW
SetWindowTextA
GetWindowDC
DrawFocusRect
GetDlgItem
EnableWindow
RedrawWindow
DrawTextA
GetDlgCtrlID
SetCursor
SetFocus
EndPaint
GetKeyState
GetFocus
LoadBitmapA
PeekMessageA
IsWindowEnabled
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
InvalidateRect
ReleaseDC
PostMessageA
UpdateWindow
DestroyWindow
keybd_event
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SendMessageA
IsDialogMessageA
TranslateMessage
MapVirtualKeyA
MessageBoxA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
MoveWindow
ExitWindowsEx
GetWindowThreadProcessId
EnumWindows
GetClassNameA
GetParent
FillRect
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SetBkColor
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
GetStockObject
TextOutA
SelectObject
CreateDIBitmap
RegOpenKeyExA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
OpenProcessToken
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
RegEnumKeyA
RegSetValueExA
RegDeleteKeyA
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupPrivilegeValueA
SetFileSecurityA
AdjustTokenPrivileges
RegOpenKeyA
ShellExecuteExA
ShellExecuteA
SHGetFolderPathA
CoTaskMemAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ